Title :
Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps
Author :
Baig, Zubair A. ; Ahmad, Sahar ; Sait, S.M.
Author_Institution :
Dept. of Comput. Eng., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia
Abstract :
The Smart Grid Infrastructure (SGI) provides for sustainable, affordable and uninterrupted electricity supply to consumers. The communications infrastructure of the SGI is prone to several malicious attacks identified in the recent past. Customer-specific electricity readings are communicated up the SGI hierarchy from consumer devices to centralized servers through intermediary devices such as smart meters and data concentrators/aggregators. In this paper, we model the attacks against the home area network of the SGI, through definition and generation of routine device behaviors. Any observed deviation from the defined normal profile is labeled as a malicious attack. Subsequently, we propose a Self-Organizing Map (SOM)-based approach towards training and testing of centralized SGI devices to qualify them for identifying anomalies accurately. The proposed scheme is capable of detecting anomalous readings within a consumer´s household, with reasonable accuracies.
Keywords :
power engineering computing; security of data; self-organising feature maps; smart power grids; SGI communications infrastructure; SGI home area network; SOM-based approach; customer-specific electricity readings; data aggregators; data concentrators; electricity supply; intrusive activity detection; malicious attack; routine device behaviors; self-organizing maps; smart grid communications infrastructure; smart meters; Electricity; Energy consumption; Intrusion detection; Neurons; Smart grids; Training; Vectors; Anomaly Detection; Intrusion Detection; Self-Organizing Maps; Smart Grid Communications;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
DOI :
10.1109/TrustCom.2013.196