Skip to main content

Securing the Smart Grid: A Machine Learning Approach

  • Chapter
  • First Online:
Smart Grids

Part of the book series: Green Energy and Technology ((GREEN))

Abstract

The demand of electricity is increasing in parallel with the growth of the world population. The existing power grid, which is over 100 years old, is facing many challenges to facilitate the continuous flow of electricity from large power plants to the consumers. To overcome these challenges, the power industry has warmly accepted the new concept smart grid which has been initiated by the engineers. This movement will be more beneficial and sustainable to the extent if we can offer a secure smart grid. Machine learning, representing a comparatively new era of Information Technology, can make smart grid really secure. This chapter provides an overview of the smart grid and a practical demonstration of maintaining the security of smart grid by incorporating machine learning.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. G. W. Group (2003) Challenge and opportunity: charting a new energy future: appendix A working group reports. Energy Future Coalition, Washington DC

    Google Scholar 

  2. Paro A, Fadigas E (2011) A methodology for biomass cogeneration plants overall energy efficiency calculation and measurement—a basis for generators real time efficiency data disclosure. In: Proceedings of power systems conference and exposition (PSCE), pp 1–7

    Google Scholar 

  3. Denholm P et al (2010) The role of energy storage with renewable electricity generation. National Renewable Energy Laboratory, Colorado

    Book  Google Scholar 

  4. DeCarolis JF, Keith DW (2006) The economics of large-scale wind power in a carbon constrained world. Energy Policy 34:395–410

    Article  Google Scholar 

  5. Archer CL, Jacobson MZ (2007) Supplying base load power and reducing transmission requirements by interconnecting wind farms. J Appl Meteorol Climatol 46:1701–1717

    Article  Google Scholar 

  6. Freris L, Infield D (2008) Renewable energy in power systems. Wiley, New York

    Google Scholar 

  7. EDAI Department of Employment (2011) Queensland energy management plan, department of employment, economic development and innovation, Queensland government. http://rti.cabinet.qld.gov.au/documents/2011/may/qld%20energy%20management%20plan/Attachments/Qld%20Energy%20Mgt%20Plan.pdf. Accessed 13 Oct 2011

  8. Delucchi M. A, Jacobson M. Z (2011) Providing all global energy with wind, water, and solar power, Part II: Reliability, system and transmission costs, and policies. Energy Policy 39:1170–1190

    Article  Google Scholar 

  9. Grant W et al (2009) Change in the Air. Power Energ Mag IEEE 7:47–58

    Article  Google Scholar 

  10. Zhong J et al (2010) Wind power forecasting and integration to power grids. In: Proceedings of 2010 international conference on green circuits and systems (ICGCS), pp 555–560

    Google Scholar 

  11. Sense of Security Pty Ltd (2011) Securing the Smart Grid. In: Proceedings of smart electricity world conference

    Google Scholar 

  12. Jamieson A (2011) Close the door! securing embedded systems. In: Proceedings of AusCERT information security conference

    Google Scholar 

  13. Smart Grid Security Myths vs. Reality (2012) White paper, SilverSpring Networks

    Google Scholar 

  14. Smart grid security critical success factors. http://www.cio.com.au/article/363005/smart_grid_security_critical_success_factors/R,Cited. 11 Feb 2013

  15. McDowell M (2009) Understanding denial-of-service attacks. http://www.us-cert.gov/cas/tips/ST04-015.html. Accessed 10 Jan 2013

  16. Ali ABMS (2012) What’s at risk as we get smarter?. IEEE Smart Grid Newsletter, USA

    Google Scholar 

  17. Khorshed M T et al (2011) Monitoring insiders activities in cloud computing using rule based learning. In: Proceedings of IEEE trustcom-11, Changsha, China

    Google Scholar 

  18. Khorshed MT et al (2012) Classifying different DoS attacks in cloud computing using rule based learning, security and communication networks. Wiley, New York

    Google Scholar 

  19. Khorshed M T et al (2011) Trust issues that create threats for cyber attacks in cloud computing. In: Proceedings of IEEE ICPADS, Tainan, Taiwan

    Google Scholar 

  20. ecuritytube.net. (2012) Ddos attack with Rdos and T3c3i3. http://www.securitytube.net/video/471922. Accessed 12 Aug 2012

  21. Batishchev AM (2012) LOIC. http://sourceforge.net/projects/loic/. Accessed 22 Aug 2012

  22. G. Inc. (2012) NewEraCracker LOIC. https://github.com/NewEraCracker/LOIC/22. Accessed Aug 2012

  23. BBC (2010) Anonymous wikileaks supporters explain web attacks. http://www.bbc.co.uk/news/technology-11971259. Accessed 23 Aug 2012

  24. Khorshed MT et al (2012) A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing, Future Generation Comput Syst Elsevier 28(6):833-851

    Google Scholar 

  25. Nanda R (2008) DDoS attack/PING flooding: explanation and solution. http://ramannanda.blogspot.com.au/2009/05/ddos-attackping-flooding-explanation.html. Accessed 23 Aug 2012

  26. Grid G (2010) Tutorial: how to DoS attack (ping flooding). http://ghostgrid.blog.com/2010/12/16/ping-flooding/. Accessed 23 Aug 2012

  27. Rouse M (2006) Ping of death. http://searchsecurity.techtarget.com/definition/ping-of-death. Accessed 23 Aug 2012

  28. Kumar A et al (2012) Performance evaluation of centralized multicasting network over ICMP ping flood for DDoS, Performance Evaluation. Int J Comput Appl 37(10):1-6

    Google Scholar 

  29. Wilmes G, Kistler U (2007) Engage packet builder—scriptable libnet-based packet builder. http://www.engagesecurity.com/products/engagepacketbuilder/. Accessed 24 Aug 2012

  30. John GH, Langley P (1995) Estimating continuous distributions in bayesian classifiers. In: Proceedings of 11th conference on uncertainty in artificial intelligence, San Mateo, pp 338–345

    Google Scholar 

  31. Michie D et al (1994) Machine learning, neural and statistical classification. Ellis Horwood series in artificial intelligence, Chichester, New York

    Google Scholar 

  32. Platt JC (1999) Fast training of support vector machines using sequential minimal optimization, Advances in Kernel Methods—Support Vector Learning, pp 185–208

    Google Scholar 

  33. Keerthi SS et al (2001) Improvements to platt’s SMO algorithm for SVM classifier design. Neural Comput 13:637–649

    Article  MATH  Google Scholar 

  34. Frank E, Witten IH (1998) Generating accurate rule sets without global optimization. In: Proceedings of 15th international conference on machine learning, pp 144–151

    Google Scholar 

  35. Quinlan JR (1993) C4. 5: programs for machine learning. Morgan Kaufmann, San Mateo

    Google Scholar 

  36. Kohavi R (1996) Scaling up the accuracy of naive-Bayes classifiers: a decision-tree hybrid. In: Proceedings of the 2nd international conference on knowledge discovery and data mining

    Google Scholar 

  37. Witten IH et al (2011) Data mining: practical machine learning tools and techniques: practical machine learning tools and techniques. Morgan Kaufmann, USA

    Google Scholar 

  38. Contextuall (2012) What is 10-Fold cross validation? https://contextuall.com/what-is-10-fold-cross-validation/. Accessed 12 Jan 2013

  39. Cohen J (1960) A coefficient of agreement for nominal scales. Educ Psychol Measur 20:37–46

    Article  Google Scholar 

  40. Marris E (2008) Upgrading the grid. Nature 454:570–573

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. B. M. Shawkat Ali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Ali, A.B.M.S., Azad, S., Khorshed, T. (2013). Securing the Smart Grid: A Machine Learning Approach. In: Ali, A. (eds) Smart Grids. Green Energy and Technology. Springer, London. https://doi.org/10.1007/978-1-4471-5210-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-5210-1_8

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-5209-5

  • Online ISBN: 978-1-4471-5210-1

  • eBook Packages: EnergyEnergy (R0)

Publish with us

Policies and ethics