Abstract
The demand of electricity is increasing in parallel with the growth of the world population. The existing power grid, which is over 100 years old, is facing many challenges to facilitate the continuous flow of electricity from large power plants to the consumers. To overcome these challenges, the power industry has warmly accepted the new concept smart grid which has been initiated by the engineers. This movement will be more beneficial and sustainable to the extent if we can offer a secure smart grid. Machine learning, representing a comparatively new era of Information Technology, can make smart grid really secure. This chapter provides an overview of the smart grid and a practical demonstration of maintaining the security of smart grid by incorporating machine learning.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. G. W. Group (2003) Challenge and opportunity: charting a new energy future: appendix A working group reports. Energy Future Coalition, Washington DC
Paro A, Fadigas E (2011) A methodology for biomass cogeneration plants overall energy efficiency calculation and measurement—a basis for generators real time efficiency data disclosure. In: Proceedings of power systems conference and exposition (PSCE), pp 1–7
Denholm P et al (2010) The role of energy storage with renewable electricity generation. National Renewable Energy Laboratory, Colorado
DeCarolis JF, Keith DW (2006) The economics of large-scale wind power in a carbon constrained world. Energy Policy 34:395–410
Archer CL, Jacobson MZ (2007) Supplying base load power and reducing transmission requirements by interconnecting wind farms. J Appl Meteorol Climatol 46:1701–1717
Freris L, Infield D (2008) Renewable energy in power systems. Wiley, New York
EDAI Department of Employment (2011) Queensland energy management plan, department of employment, economic development and innovation, Queensland government. http://rti.cabinet.qld.gov.au/documents/2011/may/qld%20energy%20management%20plan/Attachments/Qld%20Energy%20Mgt%20Plan.pdf. Accessed 13 Oct 2011
Delucchi M. A, Jacobson M. Z (2011) Providing all global energy with wind, water, and solar power, Part II: Reliability, system and transmission costs, and policies. Energy Policy 39:1170–1190
Grant W et al (2009) Change in the Air. Power Energ Mag IEEE 7:47–58
Zhong J et al (2010) Wind power forecasting and integration to power grids. In: Proceedings of 2010 international conference on green circuits and systems (ICGCS), pp 555–560
Sense of Security Pty Ltd (2011) Securing the Smart Grid. In: Proceedings of smart electricity world conference
Jamieson A (2011) Close the door! securing embedded systems. In: Proceedings of AusCERT information security conference
Smart Grid Security Myths vs. Reality (2012) White paper, SilverSpring Networks
Smart grid security critical success factors. http://www.cio.com.au/article/363005/smart_grid_security_critical_success_factors/R,Cited. 11 Feb 2013
McDowell M (2009) Understanding denial-of-service attacks. http://www.us-cert.gov/cas/tips/ST04-015.html. Accessed 10 Jan 2013
Ali ABMS (2012) What’s at risk as we get smarter?. IEEE Smart Grid Newsletter, USA
Khorshed M T et al (2011) Monitoring insiders activities in cloud computing using rule based learning. In: Proceedings of IEEE trustcom-11, Changsha, China
Khorshed MT et al (2012) Classifying different DoS attacks in cloud computing using rule based learning, security and communication networks. Wiley, New York
Khorshed M T et al (2011) Trust issues that create threats for cyber attacks in cloud computing. In: Proceedings of IEEE ICPADS, Tainan, Taiwan
ecuritytube.net. (2012) Ddos attack with Rdos and T3c3i3. http://www.securitytube.net/video/471922. Accessed 12 Aug 2012
Batishchev AM (2012) LOIC. http://sourceforge.net/projects/loic/. Accessed 22 Aug 2012
G. Inc. (2012) NewEraCracker LOIC. https://github.com/NewEraCracker/LOIC/22. Accessed Aug 2012
BBC (2010) Anonymous wikileaks supporters explain web attacks. http://www.bbc.co.uk/news/technology-11971259. Accessed 23 Aug 2012
Khorshed MT et al (2012) A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing, Future Generation Comput Syst Elsevier 28(6):833-851
Nanda R (2008) DDoS attack/PING flooding: explanation and solution. http://ramannanda.blogspot.com.au/2009/05/ddos-attackping-flooding-explanation.html. Accessed 23 Aug 2012
Grid G (2010) Tutorial: how to DoS attack (ping flooding). http://ghostgrid.blog.com/2010/12/16/ping-flooding/. Accessed 23 Aug 2012
Rouse M (2006) Ping of death. http://searchsecurity.techtarget.com/definition/ping-of-death. Accessed 23 Aug 2012
Kumar A et al (2012) Performance evaluation of centralized multicasting network over ICMP ping flood for DDoS, Performance Evaluation. Int J Comput Appl 37(10):1-6
Wilmes G, Kistler U (2007) Engage packet builder—scriptable libnet-based packet builder. http://www.engagesecurity.com/products/engagepacketbuilder/. Accessed 24 Aug 2012
John GH, Langley P (1995) Estimating continuous distributions in bayesian classifiers. In: Proceedings of 11th conference on uncertainty in artificial intelligence, San Mateo, pp 338–345
Michie D et al (1994) Machine learning, neural and statistical classification. Ellis Horwood series in artificial intelligence, Chichester, New York
Platt JC (1999) Fast training of support vector machines using sequential minimal optimization, Advances in Kernel Methods—Support Vector Learning, pp 185–208
Keerthi SS et al (2001) Improvements to platt’s SMO algorithm for SVM classifier design. Neural Comput 13:637–649
Frank E, Witten IH (1998) Generating accurate rule sets without global optimization. In: Proceedings of 15th international conference on machine learning, pp 144–151
Quinlan JR (1993) C4. 5: programs for machine learning. Morgan Kaufmann, San Mateo
Kohavi R (1996) Scaling up the accuracy of naive-Bayes classifiers: a decision-tree hybrid. In: Proceedings of the 2nd international conference on knowledge discovery and data mining
Witten IH et al (2011) Data mining: practical machine learning tools and techniques: practical machine learning tools and techniques. Morgan Kaufmann, USA
Contextuall (2012) What is 10-Fold cross validation? https://contextuall.com/what-is-10-fold-cross-validation/. Accessed 12 Jan 2013
Cohen J (1960) A coefficient of agreement for nominal scales. Educ Psychol Measur 20:37–46
Marris E (2008) Upgrading the grid. Nature 454:570–573
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this chapter
Cite this chapter
Ali, A.B.M.S., Azad, S., Khorshed, T. (2013). Securing the Smart Grid: A Machine Learning Approach. In: Ali, A. (eds) Smart Grids. Green Energy and Technology. Springer, London. https://doi.org/10.1007/978-1-4471-5210-1_8
Download citation
DOI: https://doi.org/10.1007/978-1-4471-5210-1_8
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-5209-5
Online ISBN: 978-1-4471-5210-1
eBook Packages: EnergyEnergy (R0)