IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v11y2023i4p884-d1063182.html
   My bibliography  Save this article

An Adoptive Miner-Misuse Based Online Anomaly Detection Approach in the Power System: An Optimum Reinforcement Learning Method

Author

Listed:
  • Abdulaziz Almalaq

    (Department of Electrical Engineering, Engineering College, University of Ha’il, Ha’il 55476, Saudi Arabia)

  • Saleh Albadran

    (Department of Electrical Engineering, Engineering College, University of Ha’il, Ha’il 55476, Saudi Arabia)

  • Mohamed A. Mohamed

    (Electrical Engineering Department, Faculty of Engineering, Minia University, Minia 61519, Egypt)

Abstract

Over the past few years, the Bitcoin-based financial trading system (BFTS) has created new challenges for the power system due to the high-risk consumption of mining devices. Briefly, such a problem would be a compelling incentive for cyber-attackers who intend to inflict significant infections on a power system. Simply put, an effort to phony up the consumption data of mining devices results in the furtherance of messing up the optimal energy management within the power system. Hence, this paper introduces a new cyber-attack named miner-misuse for power systems equipped by transaction tech. To overwhelm this dispute, this article also addresses an online coefficient anomaly detection approach with reliance on the reinforcement learning (RL) concept for the power system. On account of not being sufficiently aware of the system, we fulfilled the Observable Markov Decision Process (OMDP) idea in the RL mechanism in order to barricade the miner attack. The proposed method would be enhanced in an optimal and punctual way if the setting parameters were properly established in the learning procedure. So to speak, a hybrid mechanism of the optimization approach and learning structure will not only guarantee catching in the best and most far-sighted solution but also become the high converging time. To this end, this paper proposes an Intelligent Priority Selection (IPS) algorithm merging with the suggested RL method to become more punctual and optimum in the way of detecting miner attacks. Additionally, to conjure up the proposed detection approach’s effectiveness, mathematical modeling of the energy consumption of the mining devices based on the hashing rate within BFTS is provided. The uncertain fluctuation related to the needed energy of miners makes energy management unpredictable and needs to be dealt with. Hence, the unscented transformation (UT) method can obtain a high chance of precisely modeling the uncertain parameters within the system. All in all, the F-score value and successful probability of attack inferred from results revealed that the proposed anomaly detection method has the ability to identify the miner attacks as real-time-short as possible compared to other approaches.

Suggested Citation

  • Abdulaziz Almalaq & Saleh Albadran & Mohamed A. Mohamed, 2023. "An Adoptive Miner-Misuse Based Online Anomaly Detection Approach in the Power System: An Optimum Reinforcement Learning Method," Mathematics, MDPI, vol. 11(4), pages 1-22, February.
  • Handle: RePEc:gam:jmathe:v:11:y:2023:i:4:p:884-:d:1063182
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/11/4/884/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/11/4/884/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Abdulaziz Almalaq & Saleh Albadran & Mohamed A. Mohamed, 2022. "Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems," Mathematics, MDPI, vol. 10(15), pages 1, July.
    2. Abdulaziz Almalaq & Saleh Albadran & Amer Alghadhban & Tao Jin & Mohamed A. Mohamed, 2022. "An Effective Hybrid-Energy Framework for Grid Vulnerability Alleviation under Cyber-Stealthy Intrusions," Mathematics, MDPI, vol. 10(14), pages 1-20, July.
    3. Chabok, Hossein & Aghaei, Jamshid & Sheikh, Morteza & Roustaei, Mahmoud & Zare, Mohsen & Niknam, Taher & Lehtonen, Matti & Shafi-khah, Miadreza & Catalão, João P.S., 2022. "Transmission-constrained optimal allocation of price-maker wind-storage units in electricity markets," Applied Energy, Elsevier, vol. 310(C).
    4. Fahad Alsokhiry & Andres Annuk & Toivo Kabanen & Mohamed A. Mohamed, 2022. "A Malware Attack Enabled an Online Energy Strategy for Dynamic Wireless EVs within Transportation Systems," Mathematics, MDPI, vol. 10(24), pages 1-20, December.
    5. Jesse Yli-Huumo & Deokyoon Ko & Sujin Choi & Sooyong Park & Kari Smolander, 2016. "Where Is Current Research on Blockchain Technology?—A Systematic Review," PLOS ONE, Public Library of Science, vol. 11(10), pages 1-27, October.
    6. Khalid Alnowibet & Andres Annuk & Udaya Dampage & Mohamed A. Mohamed, 2021. "Effective Energy Management via False Data Detection Scheme for the Interconnected Smart Energy Hub–Microgrid System under Stochastic Framework," Sustainability, MDPI, vol. 13(21), pages 1-32, October.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Abdulaziz Almalaq & Saleh Albadran & Mohamed A. Mohamed, 2022. "Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems," Mathematics, MDPI, vol. 10(15), pages 1, July.
    2. Wang Guizhou & Zhang Si & Yu Tao & Ning Yu, 2021. "A Systematic Overview of Blockchain Research," Journal of Systems Science and Information, De Gruyter, vol. 9(3), pages 205-238, June.
    3. Büttgen, Marion & al.,, 2021. "Blockchain in Service Management and Service Research - Developing a Research Agenda and Managerial Implications," SMR - Journal of Service Management Research, Nomos Verlagsgesellschaft mbH & Co. KG, vol. 5(2), pages 71-102.
    4. Ximing Chen & Jie Shang & Muhammad Zada & Shagufta Zada & Xueqiang Ji & Heesup Han & Antonio Ariza-Montes & Jesús Ramírez-Sobrino, 2021. "Health Is Wealth: Study on Consumer Preferences and the Willingness to Pay for Ecological Agricultural Product Traceability Technology: Evidence from Jiangxi Province China," IJERPH, MDPI, vol. 18(22), pages 1-13, November.
    5. Teck Ming Tan & Saila Saraniemi, 2023. "Trust in blockchain-enabled exchanges: Future directions in blockchain marketing," Journal of the Academy of Marketing Science, Springer, vol. 51(4), pages 914-939, July.
    6. Komulainen, Ruey & Nätti, Satu, 2023. "Barriers to blockchain adoption: Empirical observations from securities services value network," Journal of Business Research, Elsevier, vol. 159(C).
    7. Dehghani, Milad & William Kennedy, Ryan & Mashatan, Atefeh & Rese, Alexandra & Karavidas, Dionysios, 2022. "High interest, low adoption. A mixed-method investigation into the factors influencing organisational adoption of blockchain technology," Journal of Business Research, Elsevier, vol. 149(C), pages 393-411.
    8. Gajendra Liyanaarachchi & Giampaolo Viglia & Fidan Kurtaliqi, 2024. "Addressing challenges of digital transformation with modified blockchain," Post-Print hal-04440365, HAL.
    9. Qunpeng Fan, 2022. "Management and Policy Modeling of the Market Using Artificial Intelligence," Sustainability, MDPI, vol. 14(14), pages 1-14, July.
    10. Chalmers, Dominic & Fisch, Christian & Matthews, Russell & Quinn, William & Recker, Jan, 2022. "Beyond the bubble: Will NFTs and digital proof of ownership empower creative industry entrepreneurs?," Journal of Business Venturing Insights, Elsevier, vol. 17(C).
    11. Tandon, Anushree & Kaur, Puneet & Mäntymäki, Matti & Dhir, Amandeep, 2021. "Blockchain applications in management: A bibliometric analysis and literature review," Technological Forecasting and Social Change, Elsevier, vol. 166(C).
    12. Fuad A. Ghaleb & Waleed Ali & Bander Ali Saleh Al-Rimy & Sharaf J. Malebary, 2023. "Intelligent Proof-of-Trustworthiness-Based Secure Safety Message Dissemination Scheme for Vehicular Ad Hoc Networks Using Blockchain and Deep Learning Techniques," Mathematics, MDPI, vol. 11(7), pages 1-24, April.
    13. Shafiqah Azman & Dharini Pathmanathan & Aerambamoorthy Thavaneswaran, 2022. "Forecasting the Volatility of Cryptocurrencies in the Presence of COVID-19 with the State Space Model and Kalman Filter," Mathematics, MDPI, vol. 10(17), pages 1-15, September.
    14. Weili Yin & Wenxue Ran, 2023. "Explaining Firm Performance During the COVID-19 With fsQCA: The Role of Supply Network Complexity, Inventory Turns, and Geographic Dispersion," SAGE Open, , vol. 13(2), pages 21582440231, June.
    15. Asha Sharma & Shurveer S. Bhanawat & Raj Bahadur Sharma, 2022. "Adoption of Blockchain Technology Based Accounting Platform," Academic Journal of Interdisciplinary Studies, Richtmann Publishing Ltd, vol. 11, March.
    16. Riya Sapra & Parneeta Dhaliwal, 2021. "Blockchain: The Perspective Future of Technology," International Journal of Healthcare Information Systems and Informatics (IJHISI), IGI Global, vol. 16(2), pages 1-20, April.
    17. Friedman, Nicola & Ormiston, Jarrod, 2022. "Blockchain as a sustainability-oriented innovation?: Opportunities for and resistance to Blockchain technology as a driver of sustainability in global food supply chains," Technological Forecasting and Social Change, Elsevier, vol. 175(C).
    18. Weichu Deng & Teng Huang & Haiyang Wang, 2022. "A Review of the Key Technology in a Blockchain Building Decentralized Trust Platform," Mathematics, MDPI, vol. 11(1), pages 1-29, December.
    19. Nadine Kathrin Ostern, 2020. "Blockchain in the IS research discipline: a discussion of terminology and concepts," Electronic Markets, Springer;IIM University of St. Gallen, vol. 30(2), pages 195-210, June.
    20. Simona Ibba & Andrea Pinna & Maria Ilaria Lunesu & Michele Marchesi & Roberto Tonelli, 2018. "Initial Coin Offerings and Agile Practices," Future Internet, MDPI, vol. 10(11), pages 1-21, October.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:11:y:2023:i:4:p:884-:d:1063182. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.