Machine Learning Algorithms Against Hacking Attack and Detection Success Comparison
Loading...
Date
2020
Journal Title
Journal ISSN
Volume Title
Publisher
Institute of Electrical and Electronics Engineers Inc.
Open Access Color
Green Open Access
No
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
Power system protection units has got enormous importance with the growing risk of cyber-attacks. To create sustainable and well protected system, power system data must be healthy. For that purpose, many machine learning applications have been developed and used for bad data detection. However, each method has got different detection and application process. Methods has superiority over other methods. Although, an algorithm can detect some injections easily, same algorithm can be fail when injection type changed. So methods have got different success results when the injection types changed. For that reason, different injection types are applied on power system IEEE 14 bus system via created special hacking algorithm. PSCAD and python linkage has been used for simulation and detection parts. 3 different injection types created and applied on the system and five different most popular algorithms (SVM, k- NN, LDA, NB, LR) tested. Each algorithm's performances are compared and evaluated. © 2020 Elsevier B.V., All rights reserved.
Description
Keywords
Bad Data Detection, Hacking Algorithm, Knn, Lda, Lr, Nb, Svm, Computer Software, Electric Power System Protection, Machine Learning, Nearest Neighbor Search, Network Security, Personal Computing, Algorithm's Performance, Application Process, Bad Data Detections, Cyber-Attacks, Ieee 14 Bus System, Injection Type, Machine Learning Applications, Power System Protection, Learning Algorithms
Fields of Science
Citation
WoS Q
N/A
Scopus Q
N/A

OpenCitations Citation Count
2
Source
-- 2nd International Conference on Smart Power and Internet Energy Systems, SPIES 2020 -- Bangkok -- 164704
Volume
Issue
Start Page
258
End Page
262
Collections
PlumX Metrics
Citations
Scopus : 2
Captures
Mendeley Readers : 3
SCOPUS™ Citations
2
checked on Mar 06, 2026
Page Views
1
checked on Mar 06, 2026
Downloads
5
checked on Mar 06, 2026
Google Scholar™


