<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE root>
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.2" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">Discrete and Continuous Models and Applied Computational Science</journal-id><journal-title-group><journal-title xml:lang="en">Discrete and Continuous Models and Applied Computational Science</journal-title><trans-title-group xml:lang="ru"><trans-title>Discrete and Continuous Models and Applied Computational Science</trans-title></trans-title-group></journal-title-group><issn publication-format="print">2658-4670</issn><issn publication-format="electronic">2658-7149</issn><publisher><publisher-name xml:lang="en">Peoples' Friendship University of Russia named after Patrice Lumumba (RUDN University)</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">32206</article-id><article-id pub-id-type="doi">10.22363/2658-4670-2022-30-3-258-268</article-id><article-categories><subj-group subj-group-type="toc-heading" xml:lang="en"><subject>Articles</subject></subj-group><subj-group subj-group-type="toc-heading" xml:lang="ru"><subject>Статьи</subject></subj-group><subj-group subj-group-type="article-type"><subject>Research Article</subject></subj-group></article-categories><title-group><article-title xml:lang="en">Detection of cyber-attacks on the power smart grids using semi-supervised deep learning models</article-title><trans-title-group xml:lang="ru"><trans-title>Обнаружение кибератак на интеллектуальные энергосистемы с использованием неконтролируемых моделей глубокого обучения</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-3651-7629</contrib-id><name-alternatives><name xml:lang="en"><surname>Shchetinin</surname><given-names>Eugeny Yu.</given-names></name><name xml:lang="ru"><surname>Щетинин</surname><given-names>Е. Ю.</given-names></name></name-alternatives><bio xml:lang="en"><p>Doctor of Physical and Mathematical Sciences, Lecturer of Department of Mathematics</p></bio><email>riviera-molto@mail.ru</email><xref ref-type="aff" rid="aff1"/></contrib><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-4466-8531</contrib-id><name-alternatives><name xml:lang="en"><surname>Velieva</surname><given-names>Tatyana R.</given-names></name><name xml:lang="ru"><surname>Велиева</surname><given-names>Т. Р.</given-names></name></name-alternatives><bio xml:lang="en"><p>Candidate of Sciences in Physics and Mathematics, Senior lecturer of Department of Applied Probability and Informatics</p></bio><email>velieva-tr@rudn.ru</email><xref ref-type="aff" rid="aff2"/></contrib></contrib-group><aff-alternatives id="aff1"><aff><institution xml:lang="en">Financial University under the Government of Russian Federation</institution></aff><aff><institution xml:lang="ru">Финансовый университет при Правительстве Российской Федерации</institution></aff></aff-alternatives><aff-alternatives id="aff2"><aff><institution xml:lang="en">Peoples’ Friendship University of Russia (RUDN University)</institution></aff><aff><institution xml:lang="ru">Российский университет дружбы народов</institution></aff></aff-alternatives><pub-date date-type="pub" iso-8601-date="2022-10-05" publication-format="electronic"><day>05</day><month>10</month><year>2022</year></pub-date><volume>30</volume><issue>3</issue><issue-title xml:lang="en">VOL 30, NO3 (2022)</issue-title><issue-title xml:lang="ru">ТОМ 30, №3 (2022)</issue-title><fpage>258</fpage><lpage>268</lpage><history><date date-type="received" iso-8601-date="2022-10-05"><day>05</day><month>10</month><year>2022</year></date></history><permissions><copyright-statement xml:lang="en">Copyright ©; 2022, Shchetinin E.Y., Velieva T.R.</copyright-statement><copyright-statement xml:lang="ru">Copyright ©; 2022, Щетинин Е.Ю., Велиева Т.Р.</copyright-statement><copyright-year>2022</copyright-year><copyright-holder xml:lang="en">Shchetinin E.Y., Velieva T.R.</copyright-holder><copyright-holder xml:lang="ru">Щетинин Е.Ю., Велиева Т.Р.</copyright-holder><ali:free_to_read xmlns:ali="http://www.niso.org/schemas/ali/1.0/"/><license><ali:license_ref xmlns:ali="http://www.niso.org/schemas/ali/1.0/">https://creativecommons.org/licenses/by-nc/4.0</ali:license_ref></license></permissions><self-uri xlink:href="https://journals.rudn.ru/miph/article/view/32206">https://journals.rudn.ru/miph/article/view/32206</self-uri><abstract xml:lang="en"><p style="text-align: justify;">Modern smart energy grids combine advanced information and communication technologies into traditional energy systems for a more efficient and sustainable supply of electricity, which creates vulnerabilities in their security systems that can be used by attackers to conduct cyber-attacks that cause serious consequences, such as massive power outages and infrastructure damage. Existing machine learning methods for detecting cyber-attacks in intelligent energy networks mainly use classical classification algorithms, which require data markup, which is sometimes difficult, if not impossible. This article presents a new method for detecting cyber-attacks in intelligent energy networks based on weak machine learning methods for detecting anomalies. Semi-supervised anomaly detection uses only instances of normal events to train detection models, which makes it suitable for searching for unknown attack events. A number of popular methods for detecting anomalies with semisupervised algorithms were investigated in study using publicly available data sets on cyber-attacks on power systems to determine the most effective ones. A performance comparison with popular controlled algorithms shows that semi-controlled algorithms are more capable of detecting attack events than controlled algorithms. Our results also show that the performance of semi-supervised anomaly detection algorithms can be further improved by enhancing deep autoencoder model.</p></abstract><trans-abstract xml:lang="ru"><p style="text-align: justify;">Современные интеллектуальные энергосети объединяют передовые информационные и коммуникационные технологии в традиционные энергосистемы для более эффективного и устойчивого снабжения электроэнергией, что создаёт уязвимости в их системах безопасности, которые могут быть использованы злоумышленниками для проведения кибератак, вызывающих серьезные последствия, такие как массовые перебои в подаче электроэнергии и повреждение инфраструктуры. Существующие методы машинного обучения для обнаружения кибератак в интеллектуальных энергетических сетях в основном используют классические алгоритмы классификации, которые требуют разметки данных, что иногда сложно, а то и невозможно. В данной статье представлен новый метод обнаружения кибератак в интеллектуальных энергетических сетях, основанный на слабых методах машинного обучения для обнаружения аномалий. Полуконтролируемое обнаружение аномалий использует только экземпляры обычных событий для обучения моделей обнаружения, что делает его подходящим для поиска неизвестных событий атак. В ходе исследования был проанализирован ряд популярных методов обнаружения аномалий с полууправляемыми алгоритмами с использованием общедоступных наборов данных о кибератаках на энергосистемы для определения наиболее эффективных из них. Сравнение производительности с популярными управляемыми алгоритмами показывает, что полууправляемые алгоритмы лучше способны обнаруживать события атак, чем управляемые алгоритмы. Наши результаты также показывают, что производительность полуконтролируемых алгоритмов обнаружения аномалий может быть дополнительно улучшена за счёт усовершенствования модели глубокого автоэнкодера.</p></trans-abstract><kwd-group xml:lang="en"><kwd>smart energy grids</kwd><kwd>cyber-attacks</kwd><kwd>semi-supervised anomaly detection</kwd><kwd>deep learning</kwd><kwd>autoencoder</kwd></kwd-group><kwd-group xml:lang="ru"><kwd>интеллектуальные энергетические сети</kwd><kwd>кибератаки</kwd><kwd>частично контролируемое обнаружение аномалий</kwd><kwd>глубокое обучение</kwd><kwd>автоэнкодер</kwd></kwd-group><funding-group/></article-meta></front><body></body><back><ref-list><ref id="B1"><label>1.</label><mixed-citation>G. Dileep, “A survey on Smart Grid technologies and applications,” Renewable Energy, vol. 146, pp. 2589-2625, 2020. DOI: 10.1016/j.renene.2019.08.092.</mixed-citation></ref><ref id="B2"><label>2.</label><mixed-citation>V. C. Gungor, D. Sahin, T. Kocak, S. Ergut, C. Buccella, C. Cecati, and G. P. Hancke, “Smart Grid technologies: communication technologies and standards,” IEEE Transactions on Industrial Informatics, vol. 7, no. 4, pp. 529-539, 2011. DOI: 10.1109/TII.2011.2166794.</mixed-citation></ref><ref id="B3"><label>3.</label><mixed-citation>T. Flick and J. Morehouse, Securing the Smart Grid: Next Generation Power Grid Security. Syngress, 2010.</mixed-citation></ref><ref id="B4"><label>4.</label><mixed-citation>S. Aftergood, “Cybersecurity: the cold war online,” Nature, vol. 547, no. 7661, pp. 30-31, Jul. 2017. DOI: 10.1038/547030a.</mixed-citation></ref><ref id="B5"><label>5.</label><mixed-citation>C. Chio and D. Freeman, Machine learning and security: protecting systems with data and algorithms. O’Reilly Media, 2018.</mixed-citation></ref><ref id="B6"><label>6.</label><mixed-citation>D. S. Berman, A. L. Buczak, J. S. Chavis, and C. L. Corbett, “A survey of deep learning methods for cyber security,” Information, vol. 10, no. 4, 2019. DOI: 10.3390/info10040122.</mixed-citation></ref><ref id="B7"><label>7.</label><mixed-citation>D. Wang, X. Wang, Y. Zhang, and L. Jin, “Detection of power grid disturbances and cyber-attacks based on machine learning,” Journal of Information Security and Applications, vol. 46, pp. 42-52, 2019. DOI: 10.1016/j.jisa.2019.02.008.</mixed-citation></ref><ref id="B8"><label>8.</label><mixed-citation>S. Ahmed, Y.-D. Lee, S.-H. Hyun, and I. Koo, “Unsupervised machine learning-based detection of covert data integrity assault in Smart Grid networks utilizing isolation forest,” IEEE Transactions on Information Forensics and Security, vol. 14, pp. 2765-2777, 2019.</mixed-citation></ref><ref id="B9"><label>9.</label><mixed-citation>M. Ozay et al., “Machine learning methods for attack detection in the Smart Grid,” IEEE Transactions on Neural Networks and Learning Systems, vol. 27, pp. 1773-1786, 2016.</mixed-citation></ref><ref id="B10"><label>10.</label><mixed-citation>V. K. Singh and M. Govindarasu, “Decision tree based anomaly detection for remedial action scheme in Smart Grid using PMU data,” in IEEE Power &amp; Energy Society General Meeting PESGM, 2018, pp. 1-5. DOI: 10.1109/PESGM.2018.8586159.</mixed-citation></ref><ref id="B11"><label>11.</label><mixed-citation>G. Pang, C. Shen, L. Cao, and A. V. D. Hengel, “Deep learning for anomaly detection: a review,” ACM Comput. Surv., vol. 54, no. 2, 2021. DOI: 10.1145/3439950.</mixed-citation></ref><ref id="B12"><label>12.</label><mixed-citation>Z. E. Huma, S. Latif, J. Ahmad, Z. Idrees, A. Ibrar, Z. Zou, F. Alqahtani, and F. A. Baothman, “A hybrid deep random neural network for cyberattack detection in the Industrial Internet of Things,” IEEE Access, vol. 9, pp. 55 595-55 605, 2021. DOI: 10.1109/ACCESS.2021.3071766.</mixed-citation></ref><ref id="B13"><label>13.</label><mixed-citation>M. S. Minhas and J. Zelek, “Semi-supervised anomaly detection using autoencoders,” Journal of Computational Vision and Imaging Systems, vol. 5, no. 1, p. 3, 2019.</mixed-citation></ref><ref id="B14"><label>14.</label><mixed-citation>M. Wieler. “Weakly supervised learning for industrial optical inspection.” (2007), [Online]. Available: https://hci.iwr.uni-heidelberg.de/node/3616.</mixed-citation></ref><ref id="B15"><label>15.</label><mixed-citation>R. Qi, C. Rasband, J. Zheng, and R. Longoria, “Semi-supervised outlier detection and deep feature extraction for detecting cyber-attacks in Smart Grids using PMU data,” Advances in Intelligent Systems and Computing, vol. 1134, pp. 509-515, 2020. DOI: 10.1007/978-3-03043020-7_67.</mixed-citation></ref><ref id="B16"><label>16.</label><mixed-citation>E. Y. Shchetinin, “On methods of quantitative analysis of the company’s financial indicators under conditions of high risk of investments,” Discrete and Continuous Models and Applied Computational Science, vol. 28, no. 4, pp. 346-360, 2020. DOI: 10.22363/2658-4670-2020-28-4-346-360.</mixed-citation></ref><ref id="B17"><label>17.</label><mixed-citation>E. Y. Shchetinin, “Modeling the energy consumption of smart buildings using artificial intelligence,” in CEUR Workshop Proceedings, vol. 2407, 2019, pp. 130-140.</mixed-citation></ref><ref id="B18"><label>18.</label><mixed-citation>E. Y. Shchetinin, “Development of Energy Saving Technologies for Smart Buildings by Using Computer Algebra,” Programming and Computer Software, vol. 46, pp. 324-329, 2020. DOI: 10.1134/S0361768820050084.</mixed-citation></ref></ref-list></back></article>
