Reference Hub14
A Machine Learning Approach for Anomaly Detection to Secure Smart Grid Systems

A Machine Learning Approach for Anomaly Detection to Secure Smart Grid Systems

Richa Singh, Arunendra Singh, Pronaya Bhattacharya
Copyright: © 2022 |Pages: 13
ISBN13: 9781668436660|ISBN10: 1668436663|EISBN13: 9781668436677
DOI: 10.4018/978-1-6684-3666-0.ch040
Cite Chapter Cite Chapter

MLA

Singh, Richa, et al. "A Machine Learning Approach for Anomaly Detection to Secure Smart Grid Systems." Research Anthology on Smart Grid and Microgrid Development, edited by Information Resources Management Association, IGI Global, 2022, pp. 911-923. https://doi.org/10.4018/978-1-6684-3666-0.ch040

APA

Singh, R., Singh, A., & Bhattacharya, P. (2022). A Machine Learning Approach for Anomaly Detection to Secure Smart Grid Systems. In I. Management Association (Ed.), Research Anthology on Smart Grid and Microgrid Development (pp. 911-923). IGI Global. https://doi.org/10.4018/978-1-6684-3666-0.ch040

Chicago

Singh, Richa, Arunendra Singh, and Pronaya Bhattacharya. "A Machine Learning Approach for Anomaly Detection to Secure Smart Grid Systems." In Research Anthology on Smart Grid and Microgrid Development, edited by Information Resources Management Association, 911-923. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-6684-3666-0.ch040

Export Reference

Mendeley
Favorite

Abstract

The rapid industrial growth in cyber-physical systems has led to upgradation of the traditional power grid into a network communication infrastructure. The benefits of integrating smart components have brought about security issues as attack perimeter has increased. In this chapter, firstly, the authors train the network on the results generated by the uncompromised grid network result dataset and then extract valuable features by the various system calls made by the kernel on the grid and after that internal operations being performed. Analyzing the metrics and predicting how the call lists are differing in call types, parameters being passed to the OS, the size of the system calls, and return values of the calls of both the systems and identifying benign devices from the compromised ones in the test bed are done. Predictions can be accurately made on the device behavior in the smart grid and calculating the efficiency of correct detection vs. false detection according to the confusion matrix, and finally, accuracy and F-score will be computed against successful anomaly detection behavior.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.