SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection

06/02/2020
by   Jiangnan Li, et al.
0

Energy theft causes large economic losses to utility companies around the world. In recent years, energy theft detection approaches based on machine learning (ML) techniques, especially neural networks, are becoming popular in the research community and shown to achieve state-of-the-art detection performance. However, in this work, we demonstrate that the well-trained ML models for energy theft detection are highly vulnerable to adversarial attacks. In particular, we design an adversarial measurement generation approach that enables the attacker to report extremely low power consumption measurements to utilities while bypassing the ML energy theft detection. We evaluate our approach with three kinds of neural networks based on a real-world smart meter dataset. The evaluation results demonstrate that our approach is able to significantly decrease the ML models' detection accuracy, even for black-box attackers.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/16/2020

Exploiting Vulnerabilities of Deep Learning-based Energy Theft Detection in AMI through Adversarial Attacks

Effective detection of energy theft can prevent revenue losses of utilit...
research
07/06/2022

Enhancing Adversarial Attacks on Single-Layer NVM Crossbar-Based Neural Networks with Power Consumption Information

Adversarial attacks on state-of-the-art machine learning models pose a s...
research
01/28/2019

Embedding is not Cipher: Understanding the risk of embedding leakages

Machine Learning (ML) already has been integrated into all kinds of syst...
research
08/01/2021

Automated Pest Detection with DNN on the Edge for Precision Agriculture

Artificial intelligence has smoothly penetrated several economic activit...
research
09/22/2021

Gotta catch 'em all: a Multistage Framework for honeypot fingerprinting

Honeypots are decoy systems that lure attackers by presenting them with ...
research
11/21/2021

Challenging Machine Learning-based Clone Detectors via Semantic-preserving Code Transformations

Software clone detection identifies similar code snippets. It has been a...
research
12/02/2020

Detection of False-Reading Attacks in the AMI Net-Metering System

In smart grid, malicious customers may compromise their smart meters (SM...

Please sign up or login with your details

Forgot password? Click here to reset