IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Machine Learning Approach for Anomaly Detection to Secure Smart Grid Systems

A Machine Learning Approach for Anomaly Detection to Secure Smart Grid Systems
View Sample PDF
Author(s): Richa Singh (Pranveer Singh Institute of Technology, India), Arunendra Singh (Pranveer Singh Institute of Technology, India)and Pronaya Bhattacharya (Institute of Technology, Nirma University, India)
Copyright: 2021
Pages: 15
Source title: Advancements in Security and Privacy Initiatives for Multimedia Images
Source Author(s)/Editor(s): Ashwani Kumar (Vardhaman College of Engineering, India)and Seelam Sai Satyanarayana Reddy (Vardhaman College of Engineering, India)
DOI: 10.4018/978-1-7998-2795-5.ch008

Purchase

View A Machine Learning Approach for Anomaly Detection to Secure Smart Grid Systems on the publisher's website for pricing and purchasing information.

Abstract

The rapid industrial growth in cyber-physical systems has led to upgradation of the traditional power grid into a network communication infrastructure. The benefits of integrating smart components have brought about security issues as attack perimeter has increased. In this chapter, firstly, the authors train the network on the results generated by the uncompromised grid network result dataset and then extract valuable features by the various system calls made by the kernel on the grid and after that internal operations being performed. Analyzing the metrics and predicting how the call lists are differing in call types, parameters being passed to the OS, the size of the system calls, and return values of the calls of both the systems and identifying benign devices from the compromised ones in the test bed are done. Predictions can be accurately made on the device behavior in the smart grid and calculating the efficiency of correct detection vs. false detection according to the confusion matrix, and finally, accuracy and F-score will be computed against successful anomaly detection behavior.

Related Content

Nithin Kalorth, Vidya Deshpande. © 2024. 7 pages.
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane. © 2024. 24 pages.
T.S. Sujith. © 2024. 13 pages.
C. Suganya, M. Vijayakumar. © 2024. 11 pages.
B. Harry, Vijayakumar Muthusamy. © 2024. 19 pages.
Munise Hayrun Sağlam, Ibrahim Kirçova. © 2024. 19 pages.
Elif Karakoç Keskin. © 2024. 19 pages.
Body Bottom