IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v38y2022ics1874548222000348.html
   My bibliography  Save this article

Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects

Author

Listed:
  • Berghout, Tarek
  • Benbouzid, Mohamed
  • Muyeen, S.M.

Abstract

In modern Smart Grids (SGs) ruled by advanced computing and networking technologies, condition monitoring relies on secure cyberphysical connectivity. Due to this connection, a portion of transported data, containing confidential information, must be protected as it is vulnerable and subject to several cyber threats. SG cyberspace adversaries attempt to gain access through networking platforms to commit several criminal activities such as disrupting or malicious manipulation of whole electricity delivery process including generation, distribution, and even customer services such as billing, leading to serious damage, including financial losses and loss of reputation. Therefore, human awareness training and software technologies are necessary precautions to ensure the reliability of data traffic and power transmission. By exploring the available literature, it is undeniable that Machine Learning (ML) has become the latest in the timeline and one of the leading artificial intelligence technologies capable of detecting, identifying, and responding by mitigating adversary attacks in SGs. In this context, the main objective of this paper is to review different ML tools used in recent years for cyberattacks analysis in SGs. It also provides important guidelines on ML model selection as a global solution when building an attack predictive model. A detailed classification is therefore developed with respect to data security triad, i.e., Confidentiality, Integrity, and Availability (CIA) within different types of cyber threats, systems, and datasets. Furthermore, this review highlights the various encountered challenges, drawbacks, and possible solutions as future prospects for ML cybersecurity applications in SGs.

Suggested Citation

  • Berghout, Tarek & Benbouzid, Mohamed & Muyeen, S.M., 2022. "Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects," International Journal of Critical Infrastructure Protection, Elsevier, vol. 38(C).
  • Handle: RePEc:eee:ijocip:v:38:y:2022:i:c:s1874548222000348
    DOI: 10.1016/j.ijcip.2022.100547
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548222000348
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2022.100547?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Tarek Berghout & Mohamed Benbouzid & Toufik Bentrcia & Xiandong Ma & Siniša Djurović & Leïla-Hayet Mouss, 2021. "Machine Learning-Based Condition Monitoring for PV Systems: State of the Art and Future Prospects," Energies, MDPI, vol. 14(19), pages 1-24, October.
    2. Shahid Tufail & Imtiaz Parvez & Shanzeh Batool & Arif Sarwat, 2021. "A Survey on Cybersecurity Challenges, Detection, and Mitigation Techniques for the Smart Grid," Energies, MDPI, vol. 14(18), pages 1-22, September.
    3. Shan, Xiaojun Gene & Zhuang, Jun, 2020. "A game-theoretic approach to modeling attacks and defenses of smart grids at three levels," Reliability Engineering and System Safety, Elsevier, vol. 195(C).
    4. Athanasios Dagoumas, 2019. "Assessing the Impact of Cybersecurity Attacks on Power Systems," Energies, MDPI, vol. 12(4), pages 1-23, February.
    5. Mohamed Benbouzid & Tarek Berghout & Nur Sarma & Siniša Djurović & Yueqi Wu & Xiandong Ma, 2021. "Intelligent Condition Monitoring of Wind Power Systems: State of the Art Review," Energies, MDPI, vol. 14(18), pages 1-33, September.
    6. Morris, Thomas & Srivastava, Anurag & Reaves, Bradley & Gao, Wei & Pavurapu, Kalyan & Reddi, Ram, 2011. "A control system testbed to validate critical infrastructure protection concepts," International Journal of Critical Infrastructure Protection, Elsevier, vol. 4(2), pages 88-103.
    7. Arshia Aflaki & Mohsen Gitizadeh & Roozbeh Razavi-Far & Vasile Palade & Ali Akbar Ghasemi, 2021. "A Hybrid Framework for Detecting and Eliminating Cyber-Attacks in Power Grids," Energies, MDPI, vol. 14(18), pages 1-22, September.
    8. Saeed Ahmed & YoungDoo Lee & Seung-Ho Hyun & Insoo Koo, 2019. "Mitigating the Impacts of Covert Cyber Attacks in Smart Grids Via Reconstruction of Measurement Data Utilizing Deep Denoising Autoencoders," Energies, MDPI, vol. 12(16), pages 1-24, August.
    9. Liang Chen & Songlin Gu & Ying Wang & Yang Yang & Yang Li, 2021. "Stacked Autoencoder Framework of False Data Injection Attack Detection in Smart Grid," Mathematical Problems in Engineering, Hindawi, vol. 2021, pages 1-8, July.
    10. Wen, Lulu & Zhou, Kaile & Yang, Shanlin & Li, Lanlan, 2018. "Compression of smart meter big data: A survey," Renewable and Sustainable Energy Reviews, Elsevier, vol. 91(C), pages 59-69.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Tarek Berghout & Toufik Bentrcia & Mohamed Amine Ferrag & Mohamed Benbouzid, 2022. "A Heterogeneous Federated Transfer Learning Approach with Extreme Aggregation and Speed," Mathematics, MDPI, vol. 10(19), pages 1-16, September.
    2. Tehseen Mazhar & Hafiz Muhammad Irfan & Sunawar Khan & Inayatul Haq & Inam Ullah & Muhammad Iqbal & Habib Hamam, 2023. "Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods," Future Internet, MDPI, vol. 15(2), pages 1-37, February.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Athira M. Mohan & Nader Meskin & Hasan Mehrjerdi, 2020. "A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems," Energies, MDPI, vol. 13(15), pages 1-33, July.
    2. Jianguo Ding & Attia Qammar & Zhimin Zhang & Ahmad Karim & Huansheng Ning, 2022. "Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions," Energies, MDPI, vol. 15(18), pages 1-37, September.
    3. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    4. Jia, Kunqi & Guo, Ge & Xiao, Jucheng & Zhou, Huan & Wang, Zhihua & He, Guangyu, 2019. "Data compression approach for the home energy management system," Applied Energy, Elsevier, vol. 247(C), pages 643-656.
    5. Namhla Mtukushe & Adeniyi K. Onaolapo & Anuoluwapo Aluko & David G. Dorrell, 2023. "Review of Cyberattack Implementation, Detection, and Mitigation Methods in Cyber-Physical Systems," Energies, MDPI, vol. 16(13), pages 1-25, July.
    6. Liu, Bo & Hou, Yufan & Luan, Wenpeng & Liu, Zishuai & Chen, Sheng & Yu, Yixin, 2023. "A divide-and-conquer method for compression and reconstruction of smart meter data," Applied Energy, Elsevier, vol. 336(C).
    7. Seyed Mahdi Miraftabzadeh & Cristian Giovanni Colombo & Michela Longo & Federica Foiadelli, 2023. "A Day-Ahead Photovoltaic Power Prediction via Transfer Learning and Deep Neural Networks," Forecasting, MDPI, vol. 5(1), pages 1-16, February.
    8. Urrea, Claudio & Morales, Claudio & Kern, John, 2016. "Implementation of error detection and correction in the Modbus-RTU serial protocol," International Journal of Critical Infrastructure Protection, Elsevier, vol. 15(C), pages 27-37.
    9. Jelke Wibbeke & Payam Teimourzadeh Baboli & Sebastian Rohjans, 2022. "Optimal Data Reduction of Training Data in Machine Learning-Based Modelling: A Multidimensional Bin Packing Approach," Energies, MDPI, vol. 15(9), pages 1-13, April.
    10. Vosughi, Amirkhosro & Tamimi, Ali & King, Alexandra Beatrice & Majumder, Subir & Srivastava, Anurag K., 2022. "Cyber–physical vulnerability and resiliency analysis for DER integration: A review, challenges and research needs," Renewable and Sustainable Energy Reviews, Elsevier, vol. 168(C).
    11. Matthew Boeding & Kelly Boswell & Michael Hempel & Hamid Sharif & Juan Lopez & Kalyan Perumalla, 2022. "Survey of Cybersecurity Governance, Threats, and Countermeasures for the Power Grid," Energies, MDPI, vol. 15(22), pages 1-22, November.
    12. Efstathios Kontouras & Anthony Tzes & Leonidas Dritsas, 2019. "Hybrid Detection of Intermittent Cyber-Attacks in Networked Power Systems," Energies, MDPI, vol. 12(24), pages 1-29, December.
    13. Wojciech Szczepanik & Marcin Niemiec, 2022. "Heuristic Intrusion Detection Based on Traffic Flow Statistical Analysis," Energies, MDPI, vol. 15(11), pages 1-19, May.
    14. Oster, Matthew R. & King, Ethan & Bakker, Craig & Bhattacharya, Arnab & Chatterjee, Samrat & Pan, Feng, 2023. "Multi-level optimization with the koopman operator for data-driven, domain-aware, and dynamic system security," Reliability Engineering and System Safety, Elsevier, vol. 237(C).
    15. Stracqualursi, Erika & Rosato, Antonello & Di Lorenzo, Gianfranco & Panella, Massimo & Araneo, Rodolfo, 2023. "Systematic review of energy theft practices and autonomous detection through artificial intelligence methods," Renewable and Sustainable Energy Reviews, Elsevier, vol. 184(C).
    16. Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
    17. Raneen Younis & Andreas Reinhardt, 2020. "A Study on Fundamental Waveform Shapes in Microscopic Electrical Load Signatures," Energies, MDPI, vol. 13(12), pages 1-19, June.
    18. Umer, Muhammad Azmi & Junejo, Khurum Nazir & Jilani, Muhammad Taha & Mathur, Aditya P., 2022. "Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations," International Journal of Critical Infrastructure Protection, Elsevier, vol. 38(C).
    19. Maik Plenz & Marc Florian Meyer & Florian Grumm & Daniel Becker & Detlef Schulz & Malcom McCulloch, 2020. "Impact of Lossy Compression Techniques on the Impedance Determination," Energies, MDPI, vol. 13(14), pages 1-12, July.
    20. Maciej Sawka & Marcin Niemiec, 2022. "A Sponge-Based Key Expansion Scheme for Modern Block Ciphers," Energies, MDPI, vol. 15(19), pages 1-18, September.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:38:y:2022:i:c:s1874548222000348. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.