Abstract

Distributed denial-of-service (DDoS) attacks are serious threats to the availability of a smart grid infrastructure services because they can cause massive blackouts. This study describes an anomaly detection method for improving the detection rate of a DDoS attack in a smart grid. This improvement was achieved by increasing the classification of the training and testing phases in a convolutional neural network (CNN). A full version of the variance fractal dimension trajectory (VFDTv2) was used to extract inherent features from the stochastic fractal input data. A discrete wavelet transform (DWT) was applied to the input data and the VFDTv2 to extract significant distinguishing features during data pre-processing. A support vector machine (SVM) was used for data post-processing. The implementation detected the DDoS attack with 87.35% accuracy.

Highlights

  • A smart grid is an innovative electricity delivery system that uses a bidirectional communication network to connect the power providers’ control systems and the consumers’ smart meters (Yan, Qian, Sharif, & Tipper, 2013), (Beigi Mohammadi, Mišić, Mišić, & Khazaei, 2014)

  • The implementation detected the Distributed denial-of-service (DDoS) attack with 87.35% accuracy

  • The variance fractal dimension trajectory (VFDT) was chosen for the pre-processing step because it is immune to noise, and it can be utilized in real time (Kinsner, 2015)

Read more

Summary

Introduction

A smart grid is an innovative electricity delivery system that uses a bidirectional communication network to connect the power providers’ control systems and the consumers’ smart meters (Yan, Qian, Sharif, & Tipper, 2013), (Beigi Mohammadi, Mišić, Mišić, & Khazaei, 2014). A smart grid infrastructure and the supervisory control and data acquisition (SCADA) systems, used in power generation, water management and oil pipelines are examples of physical systems that are disrupted by cyber space infections (Nazir, Patel & Patel, 2017), (Asri & Pranggono, 2015). Since the impact of the alteration may affect the society in a city, or a region, or even a country, the problem escalates to a cyber-physical-social security. Such security systems should be treated using cognitive informatics and cognitive computing (Wang, 2002), (Kinsner, 2012)

Objectives
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call