Machine Learning to detect cyber-attacks and discriminating the types of power system disturbances

07/06/2023
by   Diane Tuyizere, et al.
0

This research proposes a machine learning-based attack detection model for power systems, specifically targeting smart grids. By utilizing data and logs collected from Phasor Measuring Devices (PMUs), the model aims to learn system behaviors and effectively identify potential security boundaries. The proposed approach involves crucial stages including dataset pre-processing, feature selection, model creation, and evaluation. To validate our approach, we used a dataset used, consist of 15 separate datasets obtained from different PMUs, relay snort alarms and logs. Three machine learning models: Random Forest, Logistic Regression, and K-Nearest Neighbour were built and evaluated using various performance metrics. The findings indicate that the Random Forest model achieves the highest performance with an accuracy of 90.56 system disturbances and has the potential in assisting operators in decision-making processes.

READ FULL TEXT

page 2

page 3

research
03/28/2021

CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks

Detecting cyber-anomalies and attacks are becoming a rising concern thes...
research
12/12/2020

Yelp Review Rating Prediction: Machine Learning and Deep Learning Models

We predict restaurant ratings from Yelp reviews based on Yelp Open Datas...
research
08/10/2018

Using Randomness to Improve Robustness of Machine-Learning Models Against Evasion Attacks

Machine learning models have been widely used in security applications s...
research
02/10/2019

SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach

This paper presents the development of a Supervisory Control and Data Ac...
research
05/12/2023

Intercomparison of Brown Dwarf Model Grids and Atmospheric Retrieval Using Machine Learning

Understanding differences between sub-stellar spectral data and models h...
research
05/14/2023

NLP-based Cross-Layer 5G Vulnerabilities Detection via Fuzzing Generated Run-Time Profiling

The effectiveness and efficiency of 5G software stack vulnerability and ...
research
08/02/2020

Predicting United States policy outcomes with Random Forests

Two decades of U.S. government legislative outcomes, as well as the poli...

Please sign up or login with your details

Forgot password? Click here to reset