Skip to main content

An Enhanced WOA and MI-Based Feature Selection Method for Attack Detection in Smart Meter Communication

  • Conference paper
  • First Online:
Proceedings of 4th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications (ICMISC 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 873))

  • 27 Accesses

Abstract

Smart meter is a customer locality component of modern electrical grid. It is an easy target for the cyber-attacks. Learning algorithm-based intrusion detection system has good performance in various applications. It is a notable mechanism that provides security by early detection of intrusions from the meter traffic communication. The noisy data collected from the sources diminish the functioning of the attack finding algorithms. Thus, the feature selection algorithms are used to enhance the detection ratio of machine learning classifier. In this work, a collaborative method using wrapper-based whale optimization algorithm and filter-based mutual information is used to recognize the informational features. The identified features are feed as input to support vector machine classifier. The standard dataset ADFA-LD is employed to inspect the effectiveness of recommended method. The outputs certified the suitability of selected hybrid method for providing security to smart meter communication network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shi H, Xie L, Li P (2021) Detection of false data injection attacks in smart grid based on a new dimensionality-reduction method. Comput Electric Eng 91:107058

    Article  Google Scholar 

  2. Scott S (2014) Selfish insider attacks in IEEE 802.11s wireless mesh networks. IEEE Commun Mag 52(6):227–233

    Article  Google Scholar 

  3. Phanindra K, Noorullah S, Rajkumar L (2022) An anomaly based intrusion detection system using recursive feature elimination technique for improved attack detection. Theoret Comput Sci 931:56–64

    Article  MathSciNet  Google Scholar 

  4. Kevric J, Jukic S, Subasi A (2017) An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput Appl 28:1051–1058

    Article  Google Scholar 

  5. Zheng Y, Wang L, Sun W, Green RC II, Alam M (2011) Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans Smart Grid 2(4):796–808

    Article  Google Scholar 

  6. Ganesh Kumar P, Devaraj D (2010) Intrusion detection using artificial neural network with reduced input features. ICTACT J Soft Comput 1:30–36

    Article  Google Scholar 

  7. Vijayanand R, Devaraj D, Kannapiran B (2018) Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection. Comput Secur 77:304–314

    Article  Google Scholar 

  8. Anurag T, Amrita C (2022) A hybrid feature selection approach based on information theory and dynamic butterfly optimization algorithm for data classification. Expert Syst Appl 196:116621

    Article  Google Scholar 

  9. Vijayanand R, Devaraj D, Kannapiran B (2017) Support vector machine based intrusion detection system with reduced input features for advanced metering infrastructure of smart grid. In: 2017 International Conference on Advanced Computing and Communication Systems, Coimbatore, 2017, IEEE, NY

    Google Scholar 

  10. Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67

    Article  Google Scholar 

  11. Biswas SK, Mia MMM (2015) Image reconstruction using multi layer perceptron and support vector machine classifier and study of classification accuracy. Int J Sci Technol Res 04:226–231

    Google Scholar 

  12. Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297

    Article  Google Scholar 

  13. Creech G, Hu J (2013) Generation of a new IDS test dataset: time to retire the KDD collection. In: Proceedings of IEEE Wireless Communications and Networking Conference, 2013, pp 4487–4492. IEEE, New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Vijayanand .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vijayanand, R., Naveen Kumar, N., Ulaganathan, M., Devaraj, D., Kannapiran, B. (2024). An Enhanced WOA and MI-Based Feature Selection Method for Attack Detection in Smart Meter Communication. In: Gunjan, V.K., Zurada, J.M. (eds) Proceedings of 4th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications. ICMISC 2023. Lecture Notes in Networks and Systems, vol 873. Springer, Singapore. https://doi.org/10.1007/978-981-99-9442-7_60

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9442-7_60

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9441-0

  • Online ISBN: 978-981-99-9442-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics