Intrusion Detection Method Based on SMOTE Transformation for Smart Grid Cybersecurity

Mohamed Massaoudi, Shady S. Refaat, Haitham Abu-Rub

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

14 Citations (Scopus)

Abstract

Real-Time Intrusion Detection Systems (IDSs) have attracted greater attention for secured and resilient smart grid operations. IDSs are employed to identify unknown cyberattacks and malware from network traffics. In this paper, an efficient model-based machine learning is proposed to detect a variety of cyberattacks. The proposed method enhanced Extremely randomized Trees (ET) classifier based on Synthetic Minority Oversampling Technique (SMOTE) accurately classifies imbalanced IDSs data. The proposed ET-SMOTE uses a virtue of data processing blocks to enable multi-layer network cyber-security assessment in smart grids by acquiring the essential knowledge of attack dynamics. The proposed computing framework provides an accurate multiclass classification of five network traffic categories: denial of service attacks, probing attacks, root to local attacks, user to root attacks, and normal. The experimental results demonstrate the high accuracy of the proposed ET-SMOTE algorithm in detecting various types of cyber threats compared to benchmark models with an accuracy of 99.79% using the NSL-KDD networks data set.

Original languageEnglish
Title of host publication3rd International Conference On Smart Grid And Renewable Energy (sgre)
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Electronic)9781665479080
DOIs
Publication statusPublished - 2022
Externally publishedYes
Event3rd International Conference on Smart Grid and Renewable Energy, SGRE 2022 - Doha, Qatar
Duration: 20 Mar 202222 Mar 2022

Publication series

Name3rd International Conference on Smart Grid and Renewable Energy, SGRE 2022 - Proceedings

Conference

Conference3rd International Conference on Smart Grid and Renewable Energy, SGRE 2022
Country/TerritoryQatar
CityDoha
Period20/03/2222/03/22

Keywords

  • Intrusion detection
  • Machine learning
  • Multi-layer cybersecurity
  • Network traffic
  • Smart grid vulnerability

Fingerprint

Dive into the research topics of 'Intrusion Detection Method Based on SMOTE Transformation for Smart Grid Cybersecurity'. Together they form a unique fingerprint.

Cite this