IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v16y2024i6p184-d1399697.html
   My bibliography  Save this article

Exploiting Autoencoder-Based Anomaly Detection to Enhance Cybersecurity in Power Grids

Author

Listed:
  • Fouzi Harrou

    (Computer, Electrical and Mathematical Sciences and Engineering (CEMSE) Division, King Abdullah University of Science and Technology (KAUST), Thuwal 23955-6900, Saudi Arabia)

  • Benamar Bouyeddou

    (LESM Laboratory, Department of Telecommunications, Faculty of Technology, University of Saida-Dr Moulay Tahar, Saida 20000, Algeria)

  • Abdelkader Dairi

    (Computer Science Department, University of Science and Technology of Oran-Mohamed Boudiaf (USTO-MB), El Mnaouar, BP 1505, Oran 31000, Algeria)

  • Ying Sun

    (Computer, Electrical and Mathematical Sciences and Engineering (CEMSE) Division, King Abdullah University of Science and Technology (KAUST), Thuwal 23955-6900, Saudi Arabia)

Abstract

The evolution of smart grids has led to technological advances and a demand for more efficient and sustainable energy systems. However, the deployment of communication systems in smart grids has increased the threat of cyberattacks, which can result in power outages and disruptions. This paper presents a semi-supervised hybrid deep learning model that combines a Gated Recurrent Unit (GRU)-based Stacked Autoencoder (AE-GRU) with anomaly detection algorithms, including Isolation Forest, Local Outlier Factor, One-Class SVM, and Elliptical Envelope. Using GRU units in both the encoder and decoder sides of the stacked autoencoder enables the effective capture of temporal patterns and dependencies, facilitating dimensionality reduction, feature extraction, and accurate reconstruction for enhanced anomaly detection in smart grids. The proposed approach utilizes unlabeled data to monitor network traffic and identify suspicious data flow. Specifically, the AE-GRU is performed for data reduction and extracting relevant features, and then the anomaly algorithms are applied to reveal potential cyberattacks. The proposed framework is evaluated using the widely adopted IEC 60870-5-104 traffic dataset. The experimental results demonstrate that the proposed approach outperforms standalone algorithms, with the AE-GRU-based LOF method achieving the highest detection rate. Thus, the proposed approach can potentially enhance the cybersecurity in smart grids by accurately detecting and preventing cyberattacks.

Suggested Citation

  • Fouzi Harrou & Benamar Bouyeddou & Abdelkader Dairi & Ying Sun, 2024. "Exploiting Autoencoder-Based Anomaly Detection to Enhance Cybersecurity in Power Grids," Future Internet, MDPI, vol. 16(6), pages 1-19, May.
  • Handle: RePEc:gam:jftint:v:16:y:2024:i:6:p:184-:d:1399697
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/16/6/184/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/16/6/184/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Daogui Tang & Yi-Ping Fang & Enrico Zio, 2023. "Vulnerability analysis of demand-response with renewable energy integration in smart grids to cyber attacks and online detection methods," Post-Print hal-04103525, HAL.
    2. Tang, Daogui & Fang, Yi-Ping & Zio, Enrico, 2023. "Vulnerability analysis of demand-response with renewable energy integration in smart grids to cyber attacks and online detection methods," Reliability Engineering and System Safety, Elsevier, vol. 235(C).
    3. CHERIFI, Tarek & HAMAMI, Lamia, 2018. "A practical implementation of unconditional security for the IEC 60780-5-101 SCADA protocol," International Journal of Critical Infrastructure Protection, Elsevier, vol. 20(C), pages 68-84.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ding, Xiao & Wang, Huan & Zhang, Xi & Ma, Chuang & Zhang, Hai-Feng, 2024. "Dual nature of cyber–physical power systems and the mitigation strategies," Reliability Engineering and System Safety, Elsevier, vol. 244(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:16:y:2024:i:6:p:184-:d:1399697. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.