• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于元启发式算法的降维与深度学习驱动的虚假数据注入攻击检测,以增强网络安全性。

Metaheuristics based dimensionality reduction with deep learning driven false data injection attack detection for enhanced network security.

作者信息

Vaiyapuri Thavavel, Aldosari Huda, Alharbi Ghada, Bouteraa Yassine, Joshi Gyanendra Prasad, Cho Woong

机构信息

Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al Kharj, Saudi Arabia.

Department of Artificial Intelligence and Data Science, College of Computer Science and Engineering, Taibah University, Madinah, Saudi Arabia.

出版信息

Sci Rep. 2024 Aug 16;14(1):18967. doi: 10.1038/s41598-024-69806-5.

DOI:10.1038/s41598-024-69806-5
PMID:39152172
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11329662/
Abstract

Recent sensor, communication, and computing technological advancements facilitate smart grid use. The heavy reliance on developed data and communication technology increases the exposure of smart grids to cyberattacks. Existing mitigation in the electricity grid focuses on protecting primary or redundant measurements. These approaches make certain assumptions regarding false data injection (FDI) attacks, which are inadequate and restrictive to cope with cyberattacks. The reliance on communication technology has emphasized the exposure of power systems to FDI assaults that can bypass the current bad data detection (BDD) mechanism. The current study on unobservable FDI attacks (FDIA) reveals the severe threat of secured system operation because these attacks can avoid the BDD method. Thus, a Data-driven learning-based approach helps detect unobservable FDIAs in distribution systems to mitigate these risks. This study presents a new Hybrid Metaheuristics-based Dimensionality Reduction with Deep Learning for FDIA (HMDR-DLFDIA) Detection technique for Enhanced Network Security. The primary objective of the HMDR-DLFDIA technique is to recognize and classify FDIA attacks in the distribution systems. In the HMDR-DLFDIA technique, the min-max scalar is primarily used for the data normalization process. Besides, a hybrid Harris Hawks optimizer with a sine cosine algorithm (hybrid HHO-SCA) is applied for feature selection. For FDIA detection, the HMDR-DLFDIA technique utilizes the stacked autoencoder (SAE) method. To improve the detection outcomes of the SAE model, the gazelle optimization algorithm (GOA) is exploited. A complete set of experiments was organized to highlight the supremacy of the HMDR-DLFDIA method. The comprehensive result analysis stated that the HMDR-DLFDIA technique performed better than existing DL models.

摘要

近期传感器、通信和计算技术的进步推动了智能电网的应用。对发达的数据和通信技术的严重依赖增加了智能电网遭受网络攻击的风险。电网现有的缓解措施侧重于保护主要或冗余测量。这些方法对虚假数据注入(FDI)攻击做了某些假设,这些假设在应对网络攻击时是不充分且有局限性的。对通信技术的依赖凸显了电力系统易受FDI攻击的影响,这些攻击可以绕过当前的不良数据检测(BDD)机制。当前对不可观测FDI攻击(FDIA)的研究揭示了安全系统运行面临的严重威胁,因为这些攻击可以避开BDD方法。因此,一种基于数据驱动学习的方法有助于检测配电系统中的不可观测FDIA,以降低这些风险。本研究提出了一种新的基于混合元启发式算法的降维与深度学习相结合的FDIA(HMDR-DLFDIA)检测技术,以增强网络安全性。HMDR-DLFDIA技术的主要目标是识别和分类配电系统中的FDIA攻击。在HMDR-DLFDIA技术中,最小-最大标量主要用于数据归一化过程。此外,一种结合正弦余弦算法的混合哈里斯鹰优化器(混合HHO-SCA)被应用于特征选择。对于FDIA检测,HMDR-DLFDIA技术利用堆叠自动编码器(SAE)方法。为了提高SAE模型的检测结果,采用了瞪羚优化算法(GOA)。组织了一系列完整的实验来突出HMDR-DLFDIA方法的优越性。综合结果分析表明,HMDR-DLFDIA技术的性能优于现有的深度学习模型。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/56635081d987/41598_2024_69806_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/bdb1582accc8/41598_2024_69806_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/53c63fa5dcd9/41598_2024_69806_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/8d22fe45891e/41598_2024_69806_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/82a7b29a12c6/41598_2024_69806_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/f7594af61b7e/41598_2024_69806_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/1b843e536572/41598_2024_69806_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/20b2ffeca3b9/41598_2024_69806_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/08b84781fd30/41598_2024_69806_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/03ea870199cb/41598_2024_69806_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/084b0963efa1/41598_2024_69806_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/2d546b47a51c/41598_2024_69806_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/d6e2d9f6cb83/41598_2024_69806_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/29b6a241cbad/41598_2024_69806_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/49013bff160e/41598_2024_69806_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/56635081d987/41598_2024_69806_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/bdb1582accc8/41598_2024_69806_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/53c63fa5dcd9/41598_2024_69806_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/8d22fe45891e/41598_2024_69806_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/82a7b29a12c6/41598_2024_69806_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/f7594af61b7e/41598_2024_69806_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/1b843e536572/41598_2024_69806_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/20b2ffeca3b9/41598_2024_69806_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/08b84781fd30/41598_2024_69806_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/03ea870199cb/41598_2024_69806_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/084b0963efa1/41598_2024_69806_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/2d546b47a51c/41598_2024_69806_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/d6e2d9f6cb83/41598_2024_69806_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/29b6a241cbad/41598_2024_69806_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/49013bff160e/41598_2024_69806_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e090/11329662/56635081d987/41598_2024_69806_Fig15_HTML.jpg

相似文献

1
Metaheuristics based dimensionality reduction with deep learning driven false data injection attack detection for enhanced network security.基于元启发式算法的降维与深度学习驱动的虚假数据注入攻击检测,以增强网络安全性。
Sci Rep. 2024 Aug 16;14(1):18967. doi: 10.1038/s41598-024-69806-5.
2
The data dimensionality reduction and bad data detection in the process of smart grid reconstruction through machine learning.通过机器学习实现智能电网重构过程中的数据降维和坏数据检测。
PLoS One. 2020 Oct 7;15(10):e0237994. doi: 10.1371/journal.pone.0237994. eCollection 2020.
3
Advanced mathematical modeling of mitigating security threats in smart grids through deep ensemble model.通过深度集成模型减轻智能电网安全威胁的高级数学建模
Sci Rep. 2024 Oct 4;14(1):23069. doi: 10.1038/s41598-024-74733-6.
4
DDoS attack detection in smart grid network using reconstructive machine learning models.基于重构机器学习模型的智能电网网络中分布式拒绝服务攻击检测
PeerJ Comput Sci. 2024 Jan 9;10:e1784. doi: 10.7717/peerj-cs.1784. eCollection 2024.
5
A White Shark Equilibrium Optimizer with a Hybrid Deep-Learning-Based Cybersecurity Solution for a Smart City Environment.一种用于智慧城市环境的基于混合深度学习的网络安全解决方案的白鲨平衡优化器。
Sensors (Basel). 2023 Aug 24;23(17):7370. doi: 10.3390/s23177370.
6
Rule-Based Detection of False Data Injections Attacks against Optimal Power Flow in Power Systems.基于规则的电力系统最优潮流虚假数据注入攻击检测
Sensors (Basel). 2021 Apr 2;21(7):2478. doi: 10.3390/s21072478.
7
Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment.基于向量自回归的边缘计算环境下虚假数据注入攻击检测方法。
Sensors (Basel). 2022 Sep 8;22(18):6789. doi: 10.3390/s22186789.
8
Sine-Cosine-Adopted African Vultures Optimization with Ensemble Autoencoder-Based Intrusion Detection for Cybersecurity in CPS Environment.基于正弦余弦自适应非洲秃鹫优化与集成自动编码器的 CPS 环境中网络安全入侵检测
Sensors (Basel). 2023 May 16;23(10):4804. doi: 10.3390/s23104804.
9
Fast economic dispatch with false data injection attack in electricity-gas cyber-physical system: A data-driven approach.计及虚假数据注入攻击的电-气综合能源系统快速经济调度:一种数据驱动方法。
ISA Trans. 2023 Jun;137:13-22. doi: 10.1016/j.isatra.2022.12.009. Epub 2022 Dec 13.
10
A Novel Technique to Detect False Data Injection Attacks on Phasor Measurement Units.一种新型技术,可检测相量测量单元上的虚假数据注入攻击。
Sensors (Basel). 2021 Aug 28;21(17):5791. doi: 10.3390/s21175791.