Anomaly-based Framework for Detecting Power Overloading Cyberattacks in Smart Grid AMI
Abstract
The Advanced Metering Infrastructure (AMI) is one of the key components of the smart grid. It provides interactive services for managing billing and electricity consumption, but it also introduces new vectors for cyberattacks. Although, the devastating and severe impact of power overloading cyberattacks on smart grid AMI, few researches in the literature have addressed them. In the present paper, we propose a two-level anomaly detection framework based on regression decision trees. The introduced detection approach leverages the regularity and predictability of energy consumption to build reference consumption patterns for the whole neighborhood and each household within it. Using a reference consumption pattern enables detecting power overloading cyberattacks regardless of the attacker’s strategy as they cause a drastic change in the consumption pattern. The continuous two-level monitoring of energy consumption load allows efficient and early detection of cyberattacks. We carried out an extensive experiment on a real-world publicly available energy consumption dataset of 500 customers in Ireland. We extracted, from the raw data, the relevant attributes for training the energy consumption patterns. The evaluation shows that our approach achieves a high detection rate, a low false alarm rate, and superior performances compared to existing solutions.
keywords:
Smart grid , Advanced Metering Infrastructure (AMI) , Overloading cyberattacks , Anomaly detection.1 Introduction
Information and communication technologies played a crucial role in the growth and performance of the smart grids. The advanced metering infrastructure provides a two-way communication network between smart meters and utility systems, offering interactive services for managing billing and electricity consumption. However, interconnecting the smart grid distributed elements, also introduces new vectors for cyberattacks. The first successful cyberattack on power grid is recorded in December 2015, it struck the Ukraine power grid causing power outages putting more than 100 cities in the dark. The hackers exploited vulnerable points in the infrastructure using a piece of malware known as Black Energy. Several other cyberattacks have followed showing how a hacker with a piece of malware can take control of a power plant’s circuit breaker and damage generators.
Power overloading is one of the most severe cyberattacks, it aims at increasing the energy load to disrupt the load balance on the local power grid, cause a blackout, and damage the grid infrastructure. An attacker with low cost equipment could exploit security vulnerabilities within some points in the smart grid communication infrastructure, particularly within smart meter. The exploit may grant the attacker the command and control of thousands of smart meters that he can subsequently use to dramatically increase the demand of electricity, and to disrupt the load balance on the local power grid. The attacker can also compromise the communication infrastructure or hack the substation, and then send fake pricing information to the local community. By exploiting the vulnerability of load control systems, an attacker can modify the consumption profile of the customers and the whole neighborhood (more details are provided in section 4). Although, the severe impact of power overloading cyberattacks, few works [1, 2, 3, 4] in the literature have addressed them.
Traditional anomaly detection systems based on network features did not consider attack scenarios and inherent characteristics of the smart grid AMI. Current smart grid AMI anomaly detection systems consider fault detection [5], and address mainly two types of cyberattacks: electricity theft and pricing cyberattacks [6, 7, 8]. The goal of energy theft is to pay less than the actual price for the consumed energy, in this case the attacker can physically tamper the smart meter, or compromise the communication infrastructure [9]. Two common pricing cyberattacks on smart home systems, which manipulate guideline pricing have been studied in the literature [2, 3, 4]. In the first one, named cyberattack for bill reduction, the attacker attempts to fake the guideline pricing curve such that it can reduce the cost of his own bill at the cost of bill increase of other customers. The goal of the second cyberattack is to create a peak energy load in the local community.
Most of the existing anomaly detection systems for smart grid AMI in the literature have been proposed for energy theft detection [10, 11, 12, 13, 14, 15, 16] and pricing cyberattacks [2, 3, 4]. However, few researches have addressed overloading cyberattacks targeting grid blackout. Although some works [1, 2, 3, 4] addressed grid overloading cyberattacks, they only considered short term load increase resulting from pricing manipulation. In this case, the attacker’s goal is to make profit not to shut down the power grid. Anomaly detection systems which monitor the guideline pricing curve are only effective if the attacker overloads the grid by manipulating the guideline pricing curve. Otherwise, the grid overloading cyberattacks would not be detected if the attacker changes its strategy.
Some existing anomaly detection systems proposed in the literature deal with energy theft and grid overloading in the same way. Although energy theft and grid overloading both correspond to an abnormality in the consumption pattern, the two attacks have their proper subtleties and differ in several points such as: attacker’s operating mode, detection delay, and impact on the AMI. Unlike energy theft, grid overloading cyberattack causes an immediate damage, therefore the detection delay is critical in this case. The impact of grid overloading cyberattacks is beyond the smart home, therefore monitoring the energy load at a neighborhood level is needed to avoid cascading failure.
Most of the existing anomaly detection systems in the literature used classification algorithms. One issue with classification-based anomaly detection is the unavailability of malicious samples. Using synthetic malicious samples can solve this issue, however the classifier would not detect unseen attacks that significantly deviate from the synthetic malicious samples used to train the system.
In this paper, we tackle the issue of grid overloading cyberattacks against the smart grid AMI. We propose a consumption pattern-based anomaly detection framework (CPADF) to detect and prevent grid overloading cyberattacks. CPADF applies features engineering and regression-based learning algorithms on historical consumption data to generate normal consumption patterns for the whole neighborhood and for each customer within it. The obtained trained models are then harnessed in a decision making process, we developed, to detect anomalies in consumption patterns. To do so, CPADF monitors continuously electricity consumption at both home and neighborhood level and aggregates anomaly alerts received from customers. An abnormal consumption raise is then detected at a given level if the observed consumption does not match up with its corresponding normal consumption pattern.
We carried out experiments on a real-world publicly available energy consumption dataset of 500 customers in Ireland. We proceeded with data cleaning and feature extraction on the raw data. Initially, the dataset provides 3 attributes only (smart meter identifier, timestamp, and energy consumption) from which we extracted some relevant attributes for training the energy consumption patterns, such as day time, day type, month and season, and we generated labelled datasets for both home and neighborhood levels for the model training and testing111The generated labelled datasets are made available for free upon request.. The evaluation shows that our approach achieves a high detection rate, a low false alarm rate, and superior performances compared to existing solutions with an optimal training time and memory requirement.
Furthermore, CPADF outperforms existing approach in terms of exploring and detecting sophisticated scenarios of power overloading cyberattacks against smart grid AMI. Indeed, the consumption pattern-based anomaly detection makes CPADF able to detect grid overloading cyberattacks regardless of the attacker’s strategy. Whereas, most of the existing solutions are attacker’s strategy oriented, which may fail in detection of cyberattacks if the attacker changes its strategy.
The remainder of this paper is organized as follows. In Section 2, we summarize the state of the art in the field of anomaly detection systems developed to protect smart grid systems. In Section 3, we present the AMI network architecture. In Section 4, different types of power overloading cyberattacks are studied. Section 5 describes the CPADF framework from data collection to anomaly detection process. We evaluate the performance of CPADF in Section 6. Section 7 concludes the paper and draws some lines for future work.
2 Related work
Most of the existing works in the literature are related to fraud detection, such as electricity theft and pricing cyberattacks. In [2] and [3] the authors considered two smart home pricing cyberattacks: cyberattack for bill reduction; and cyberattack for forming a peak energy load. In the first cyberattack, the hacker attempts to fake the guideline pricing curve such that it can reduce the cost of his own bill at the cost of bill increase of other customers. The goal of the second cyberattack is to create a peak energy usage by faking the guideline pricing curve. A countermeasure technique which uses support vector regression and impact difference for detecting pricing manipulation has been proposed in [2]. The proposed system leverages the interdependence between the electricity pricing and the energy load in the power system. It detects the peak energy load by monitoring changes in the guideline pricing curve. To improve the detection system accuracy, the authors proposed in [3] a partially observable Markov decision process for modeling the long term impact of pricing cyberattacks. In [4], the authors introduced a new type of pricing cyberattack, which creates a sharp increase or decrease of the energy load, resulting in a dramatic drop of generation frequency. To tackle the scalability limitation of the system proposed in [3] and address the new pricing cyberattack, Liu et al.[4] proposed a new hierarchical framework, which models the attacking state of each smart meter in a distributed fashion. The proposed framework employs a global policy optimization algorithm to take a centralized decision on checking and repairing the compromised smart meters. In [2, 3, 4], the attacker’s objective is to make profit not to cause a blackout by overloading the grid. Although [2, 3, 4] address grid overloading cyberattack, they only consider short term load increase resulting from pricing manipulation. On the other hand, in this paper we consider different types of long term grid overloading cyberattacks. The proposed anomaly detection systems in [2, 3, 4] are only effective if the attacker creates a peak energy load by manipulating the guideline pricing curve. In this paper, we focus on detecting grid overloading cyberattacks based on consumption pattern changes, regardless of the attacker’s strategy.
Jokar et al. [1] addressed grid overloading as well as energy theft. They considered the scenario, where the attacker increases the energy load by manipulating prices or compromising the direct load control system. The authors [1] proposed two anomaly detection algorithms based on the predictability of consumption patterns of customers. In [10] Jokar et al. extended and adapted their proposition to detect only energy theft attack. They used transformer meters and anomaly detectors, as well as appropriate classification and clustering techniques, to improve the performance and the robustness of the algorithm against nonmalicious changes in consumption pattern. Classification-based methods need malicious samples to train the classifier, which might not be available, since malicious behavior might never or seldom occur for a given customer. Using synthetic malicious samples can solve the problem. However the classifier would not detect attacks that deviate significantly from the synthetic malicious samples used to train the system. In this paper, we use regression decision trees to predict the consumption profiles during a particular time slot, and then we compare the expected profile with the actual one. Our approach is capable of detecting different attack types, because it does not build the classifier using a particular type of synthetic malicious samples.
Ford et al. [17] and Cody et al. [18] also addressed grid overloading as well as energy theft. They used artificial neural networks and decision tree respectively to model the normal profile of customer’s energy consumption. Real historical data from the Irish smart energy trial [19] were used to generate the regression models and predict future energy consumption. Then, the anomaly detection systems compare the predicted value with the actual consumption to detect malicious behaviors. Although the proposed approaches [17] [18] overcome the limitations of classification-based methods, only one type of grid overloading cyberattack has been considered. The proposed systems do not monitor the consumption pattern at the neighborhood level. Monitoring pattern change at the neighborhood level improves the detection accuracy and reduces the detection delay, since the load increase is more noticeable at the neighborhood level than for a single customer or group of customers, particularly at the beginning of the attack. Important factors such as memory requirement and processing time have not been considered. Using more attributes to model the consumption pattern, CPADF provides a better prediction with lower error rates. CPADF shows good performance in terms of memory requirement and processing time. Our tests show that CPADF outperforms the anomaly detection systems proposed in [17] [18].
Faisal et al. [20] proposed a new intrusion detection system (IDS) architecture for the whole AMI system at the levels of smart meter, data concentrator, and headend. A feasibility analysis of the application of several data stream mining algorithms has been conducted to select the best algorithm for each AMI component. In [21], Zhang et al. proposed a distributed intrusion detection system for smart grids (SGDIDS) with a hierarchical three layer structure. The proposed IDS analyzes communication traffic using classification algorithms such as support vector machine (SVM) and artificial immune system (AIS). The proposed systems in [21] and [20] have been validated on the widely used public KDD Cup 1999 dataset [22]. However, this dataset was designed for intrusion detection in computer networks, the considered attacks are based on communication scenarios. The dataset did not consider characteristics inherent to the smart grid infrastructure and attack scenarios against AMI transactions. Furthermore, the KDD dataset [22] has a huge number of redundant records and biased distribution of attacks.
In [23] an optimal strategy of on-site investigation and monitoring verification for potential anomalies and malware is proposed. Using the decision process framework of Markovian, and based on the observation from the deployed anomaly detectors, the proposed framework determines the best inspection strategies. Alcarez et al. [24] examined key security aspects of the Open Charge Point Protocol (OCPP) for communication between electric vehicle, charging points and central management system. The paper shows how a hacker can exploit OCPP vulnerabilities to carry out attacks to burden resource reservation related to electric vehicle, steal energy, or overload the grid. For instance, an attacker might inject forged OCPP transaction to destabilize network or to affect its functioning. In [25] the authors analyzed a set of existing anomaly detection approaches which use machine learning, knowledge and statistical detection-based techniques, and information and spectral theory. The authors investigated the functionalities of the detection approaches for context-awareness in smart grid environments. The paper provides a guideline regarding the choice of the most suitable schemes and detection modes. The suitability is examined based on the restrictions of the context and functional characteristics of the technologies and communication systems. In section 6.4, we show the suitability of CPADF to the smart grid context according to the set of requirements specified in [25].
3 AMI network architecture
The smart home (SH) constitutes an integral part of the smart grid AMI, it leverages sensors and networking technologies to be in continuous interaction with its internal and external environments. The Energy Services Interface (ESI) represents the interface connecting the SH to the smart grid. Although there is a logical separation between the smart meter and ESI, their functionalities are generally integrated into one physical device (generally the smart meter) for cost effectiveness. The ESI has diverse functionalities, such as remote control of devices, transmission of consumption data to the utility, supervising of Distributed Energy Resources such as wind turbines, the management of demand response programs, Plug in Electric / Plugin Electric Hybrid Vehicles (PEV/PHEV) charging etc. The Energy Management System (EMS) represents the entity responsible for managing diverse appliances and systems within the SH. It enables the SH to adjust its energy consumption to suit the grid’s capacities. The EMS enables the management of high consuming appliances such as air conditioning system, and offers the remote configuration of the smart home devices [26]. Figure 1 shows the different entities of the AMI network architecture. The connections to the ESI are represented by the green dot-dashed lines, whereas the red-dotted lines represent the connections to the EMS. The communication between the smart home and the AMI infrastructure is represented by the blue dashed line. The EMS and ESI are in constant two-way communication to manage the internal environment in coherence with the external environment requirements and capabilities [26]. The Home Area Network (HAN) interconnects appliances with ESI/smart meters and EMS. The Neighborhood Area Network (NAN) represents the network interconnecting the smart meters with the data concentrator. The Wide Area Networks (WAN) interconnects multiple NANs to the Utility headend.
![Refer to caption](x1.png)
4 Power overloading cyberattacks
In this section we present three types of power overloading cyberattacks which exploit the vulnerability of load control systems (such as smart home scheduling systems), and the vulnerability of OCPP protocol. The goal of load control systems is balancing supply and demand to ensure a reliable grid operation. Indirect load control (ILC) mechanisms use dynamic pricing to incite customers to adapt their consumption profiles to suit the grid capabilities. There are two dynamic pricing models, which are usually used together. The first model called real time pricing, where the price is set based on the energy consumption in the local community. The second one is the guideline pricing, where the utility predicts the future load, sets a predictive pricing curve, and uses it for guiding the customers on energy scheduling. The Direct Load Control mechanisms (DLC) allow the utility to directly control the customers’ loads by sending control signals such as turn on/off, through AMI. The OCPP is an application protocol for communication between electric vehicle and charging point and a central management system. One advantage of the introduction of electric vehicles into smart grids, is their bidirectional charging which allows local and global smoothing of imbalances and load peaks. Alcaraz et al. [24] studied attacks that misuse the OCPP protocol to destabilize power networks and interfere with resource reservation initiated with the electric vehicle. Although the paper provides divers threat scenarios related to the logical functionality of the OCPP at different stages, in this paper, we consider power overloading scenario at transactions and control stage.
![Refer to caption](x2.png)
4.1 Cyberattacks against ILC
By manipulating the pricing curve, an attacker can modify the consumption profile of the customers and the whole neighborhood consumption profile. The attacker can either compromise the communication infrastructure or hack the substation, and then send fake pricing information to the local community. The attacker can also use a malware to compromise the smart meter and then modify the received pricing information (see figure 2). He can then scale that up as much as he may take control of thousands of smart homes, depending on the propagation of the malware [23]. In this paper we consider the two following cyberattacks against ILC mechanisms, called pricing cyberattacks [2] as follows.
4.1.1 Cyberattack for bill reduction
The attacker manipulates the guideline pricing curve, in such a way that the electricity price is high during a particular time slot. This will dissuade the other customers to schedule energy consumption during this time slot. Thus, this reduces the local community energy load during this time slot, resulting in the decrease of the real time electricity price there. Afterward, the attacker could schedule the energy consumption during this time slot, and makes profit through reducing his own bill at the cost of bill increase of other customers [2].
4.1.2 Cyberattack for forming a peak energy load
The attacker first identifies peak consumption energy hours, and then he manipulates the guideline pricing curve such that it is very low during peak energy consumption hours. Therefore, the customers will schedule their large controllable high consumption appliances during peak usage energy hours. This will form a peak in energy consumption leading to significant disturbance in the power system. Also increasing energy load fluctuation could significantly impacts the power system dynamics and changes the generation frequency dramatically. The attacker could increase the energy load fluctuation by manipulating the guideline prices such that it is very high during a time slot then it is very low during the next one, the shorter the time slot is, the higher load fluctuation would be [2] [4].
4.2 Cyberattacks against DLC
The attacker compromises the EMS to send fake “turn on/off” signal ordering a large number of appliances within the premises to get switched on [1]. For instance, the attacker can create a surge by turning air conditioners on during peak usage energy periods such as extreme cold/heat or during peak usage hours of the day. Also in this case, the attacker can increase the energy load fluctuation by repeatedly sending turn on/off signals to a large number of appliances, particularly the high consumption ones, such as air conditioning. This will create disturbances and imbalances in the grid that could stumble breakers beyond the targeted neighborhood and cause a large area blackout. Table 1 summaries the characteristics of power overloading cyberattacks against load control mechanisms, and shows the anomalous consumption pattern changes.
4.3 Cyberattack against OCPP
It has been shown in [24] that an attacker may damage the energy safety if the communication channels are intercepted, and the security credentials of an OCPP user/object is known. A hacker might carry out several attacks such as: denial of power resources and services, energy theft, and power overload. As mentioned previously, in this paper, we are interested in power overloading scenario. In smart grids, the majority of charging points are configured to provide bidirectional interfaces for power charging/discharging, so that batteries discharge during peak periods and charge during off-peak times. The central management system defines the charging profiles which specify the amount of power that can be supplied per time interval to one or multiple points of charge with their charging schedules. To increase power demand at peak periods, the attacker alters the charging profiles, in such a way that the intensity of Wh has to be greater at peak hours or equal to the power consumption in off-peak periods. The fake charging profiles are then used, so that multiple compromised points of charge inject energy into electric vehicle during peak periods.
Cyberattacks Load control mechanisms Time slots Usage patterns Bill reduction ILC Random Decrease of the whole neighborhood consumption Increase of N compromised smart home consumptions Forming peak energy load ILC/DLC Peak hours Increase of the whole neighborhood consumption Increasing load fluctuation ILC/DLC Random and short Succession of energy consumption increase and decrease
5 CPADF Framework
In this section, the CPADF is described. Firstly, data collection and attributes extraction are described. Next, regression algorithms used for consumption pattern modeling are presented. Lastly, the anomaly detection processes at smart home and neighborhood level are described in details. Hereinafter, we use the abbreviations SH to refer to smart home, and NBH to refer to neighborhood.
5.1 Data collection and attributes extraction
Data collection and training process of consumption prediction models for SH and NBH anomaly detectors are illustrated in figure 3. Firstly, metering data are collected from each SH, and from transformer meter. Then, a dataset is generated for each SH, also NBH dataset including the whole neighborhood half hourly consumption is generated. Each data vector within SH and NBH datasets includes the electricity consumption along with a set of time and seasonal related attributes extracted from the raw data (time stamp and consumption). We consider the following attributes: time, day period (day/night), day type (weekday/weekend), month, and season. These attributes are used to allow predicting electricity consumption. For instance, if we consider the attribute day period, most often, electricity consumption tends to decrease during night due to the decline of human activities. The day type attribute allows catching legitimate consumption pattern changes related to the customer activity. For instance, the consumption on the weekend may drop considerably if the customer usually leaves his/her place for some vacations. In contrast, if the customer stays at home, he/she may consume more electricity than usual by spending more time using entertainment devices such as video games, TV, PC, etc. It is important to underline that electricity usage is directly or indirectly affected by external conditions, particularly by the seasonal conditions as weather and temperature. In winter, the weather is cold and dark, people tend to stay at home, and thus consume more electricity on lighting and heating. While in summer, the weather is sunny and hot, people tend to be out to enjoy sunny weather, so that their electricity consumption decreases. Also, the month attribute needs to be considered, because even within the same season two months could have different consumption pattern, such as September/ December or January/ March. For instance, the consumption pattern of the 1st of October differs from the one of the 21th of December, due to several factors such as: the number of daytime hours and temperature. The NBH prediction model is trained using periodic NBH global consumption calculated and sent by the transformer meter. The SH/NBH historical electricity consumption data are used to model and predict future electricity consumption.The machine learning algorithms used to model consumption pattern are described in the subsequent section 5.2. The SH prediction models are trained within the data concentrator to overcome resource limitation within the ESI. Abnormal consumption samples flagged as suspect by SH anomaly detector are transferred to the data concentrator.
![Refer to caption](x3.png)
5.2 Modeling consumption patterns
To model SH/ NBH electricity consumption pattern so we can predict consumption at any time of the day, five algorithms of supervised machine learning have been used. These algorithms are selected for their known performance and low prediction error rate. The following gives brief description of the machine learning algorithms used in this paper.
5.2.1 REPTree
REPTree (Reduced Error Pruning Tree) is a fast decision tree learner that uses information gain ratio (Formula (2)) as splitting criterion, where is the whole dataset, is the number of classes, is the frequency of class in the dataset, is the number of subsets generated by the split [27].
(1) |
(2) |
5.2.2 M5P
5.2.3 Random Forest
Random forest [28] is a combination of unpruned regression trees, it uses random feature selection in the tree induction process. The forest averages the prediction outputs returned by the individual trees.
5.2.4 Artificial Neural Network
An artificial neural network is computational system consisting of interconnected simple elements called neurons, which produce output depending on one or more inputs and an activation function e.g., sigmoid function, hyperbolic, etc. Where in Formula (4) represents the activation function that determines the output value according to the values of entries and their weights [27].
(4) |
5.2.5 SVM
SVM is a supervised learning model used for classification and regression problems. For regression, SVM uses the insensitive loss function that penalizes error only if it is greater than [29]. Therefore, the is represented as:
Using (non-negative) slack variables and , the final optimization problem to be solved can be formulated as follows:
(5) |
Where is a n-dimensional vector, and is the target, w is the weight vector, C represents the penalty for the error term. SVM regression finds the linear regression in the high-dimension feature space using while reducing the model complexity by minimizing
![Refer to caption](x4.png)
5.3 Anomaly detection
The CPADF two-level monitoring architecture operates within the two main components of the AMI: the ESI, and the data concentrator, as illustrated in Figure 4. Periodic metering data from SH are inserted into the SH preprocessing module, which is responsible for attributes extraction and data preprocessing. Since the NBH consumption depends on the consumption of all SHs in the neighborhood, the same set of time related and seasonal attributes are extracted from NBH metering data. The expected consumption calculated by the prediction model, is then compared with the received consumption value.
After preprocessing the SH metering data into the appropriate format consistent with the SH training set, the SH regression model predicts the SH electricity consumption for the given attributes vector. If within successive time intervals the number of times an anomaly (consumption increase) is detected with a certain threshold (), then an anomaly is reported and the suspect sample is sent to the data concentrator. Otherwise, the processed sample is added to the benign dataset which is periodically transferred to data concentrator for periodic retraining. The threshold () specifies the number of tolerable successive abnormal consumption increase. This threshold is used to mitigate false alerts caused by occasional legitimate consumption increases. An unusual legitimate consumption increase may be caused by operating one or multiple high energy consumption appliances (washing machine, dishwasher, vacuum cleaning, oven, etc) out of their usual operating time. On average, the length of use of such appliances is between 40 and 120 minutes. For instance, a cycle of washing machine lasts on average between 20 and 60 minutes, most dishwashers cycles are about 2 hours. Thus, the threshold is set to 2 (which corresponds to two successive time intervals of 1 hour). The threshold is set and updated by the system administrator.
(6) |
The prediction root mean squared error (RMSE) is used as prediction error (PE) for both SH and NBH anomaly detection algorithms. RMSE measures the square root of the average of squared differences between the prediction () and the actual observation () (see equation (6)). Since the errors are squared before they are averaged, the RMSE gives a relatively high weight to large errors. By penalizing large errors, the RMSE value increases with the variance of the frequency distribution of error magnitudes. Taking RMSE as prediction error to calculate the threshold, allows to mitigate the detection of legitimate consumption increases as anomalous. The prediction models are retrained when benign datasets are large enough in terms of instances. Periodic retraining allows CPADF to adapt to consumption pattern changes related to nonmalicious factors such as changes of residents or appliances, etc. Pseudocodes of the SH anomaly detection algorithm is provided in Algorithm 1.
At the SH level, the periodic consumption monitoring is set to 1 hour, because humans typically operate on hour interval, therefore it is difficult to notice pattern change over a smaller time interval. However, consumption pattern changes of a large number of SHs even over a shorter period of time results in drastic consumption pattern change of the whole NBH. Therefore, at the NBH level, the periodic consumption monitoring is set to the smart meter data collection frequency (30 minutes) to provide the minimal detection delay. The NBH total electricity is measured by the transformer meter. After calculating and preprocessing the NBH attributes vector, this latter is given to the NBH regression model to predict consumption. If the received consumption is larger than the sum of the predicted consumption and the prediction error (RMSE), then a Neighborhood Abnormal Consumption Raise (NACR) is detected, the suspect sample is stored, and an alert is sent to the decision maker. Otherwise, the processed sample is added to the benign dataset () for the periodic retraining of NBH consumption profile. Pseudocodes of the NBH anomaly detection algorithm is provided in Algorithm 2.
The decision maker module confirms the anomaly and notifies the operator in two cases: 1) more than half of SH anomaly detection systems in the NBH report an anomaly; 2) when a neighborhood abnormal consumption raise is reported. The first case corresponds to bill reduction cyberattack, the second one corresponds to forming peak energy load cyberattack. Then, the utility headend checks whether the detected anomaly is caused by a cyberattack or it is related to a temporary pattern change such as special occasions. After decision, the appropriate response is triggered, the attack or normal samples are stored into either attack or benign datasets. Initially, attack datasets are empty unless external sources are used. Malicious samples classified by the decision maker will be added to the attack datasets. Once the two datasets are large enough, they will be used to build new classifiers for SH and NBH. These classifiers will constitute a second detection level and a decision support system for the utility headend. This approach allows for overcoming issues related to using synthetic malicious samples to train the classifiers. If NACR was detected, but no anomalies have been reported, it appears that an attack might be occurring but the SH anomaly detection system cannot recognize it. In this situation, the SH dataset is analyzed for sign of gradual overloading cyberattack, in which the attacker gradually increases the consumption data to mislead the learning machine to consider a malicious pattern as a normal one. The long-term tendency in daily consumption (historical data) of the smart home is analyzed. A gradual overloading can be characterized by an ascending slope in long-term consumption curve. Pseudocodes of the decision making algorithm is provided in Algorithm 3.
Meter ID | Encoded date/time | Energy Consumption (KWh) |
---|---|---|
1392 | 19535 | 0.256 |
1392 | 19538 | 0.265 |
1951 | 19604 | 0.042 |
1951 | 19605 | 0.021 |
6 Experimental results
We used in our experimentation the smart meter energy consumption data from the Irish Smart Energy Trial [19], the dataset was released by SEAI in January 2012. The dataset has been created within Smart Metering Electricity Customer Behaviour Trials (CBTs) which has taken place from 2009 to 2010. The purpose of the trials was to assess the impact on consumer’s electricity consumption in order to inform the cost-benefit analysis for a national rollout. The dataset contains the energy consumption data of over 5000 residential households and businesses [19]. The dataset is constituted of six data files with millions of entries per file. Each data file contains three columns, the first column indicates the smart meter ID which identifies a particular resident or business. The second column represents timestamps corresponding to the time and date of the meter reading. Digits 1-3 represents the day code (day 1 = 1st January 2009), time code is represented by digits 4-5 (1-48 for each 30 minutes with 1= 00:00:00 – 00:29:59). The third column indicates the energy consumption value in kilowatt-hours (kWh). Table 2 shows a small sample of the raw data.
6.1 Datasets generation and preprocessing
The raw dataset includes the energy consumption data of all customers. To model each customer’s consumption pattern separately, the raw consumption data are split by meter ID into a collection of consumption datasets. For each customer dataset, a set of attributes are generated. Each vector in the new dataset includes the following attributes: SH consumption per hour; hour (1, …, 24); day type (weekday or weekend); month and season. Among four consecutive weeks one week is randomly chosen for the validation set and the other 3 weeks for the training set. Thus we use 75 % of the dataset for training and 25 % for validation. Likewise, from the raw data the NBH dataset is generated. Each vector in NBH dataset consists of the half hourly consumption of the whole NBH (the summation of meter reading of all customers within the neighborhood) and the same attributes used for SH datasets: hour, day type, day period, month and season. Among four consecutive weeks one week is randomly chosen for the validation set and the other 3 weeks for the training set.
![Refer to caption](x5.png)
Data preprocessing includes operations such as cleaning and normalization. The cleaning task consists in identifying missing values and eliminating outliers and extreme values. Outliers and extreme values such as peak energy consumption may correspond to unusual activities such as holidays or special occasions. The mean and standard deviation for each time interval within each month is calculated. All consumption values that do not lie within three of the mean are removed from the dataset. Figure 5 summarizes the datasets generation process. As indicated previously, different time intervals have been used for SH and NBH datasets because at SH level it is difficult to notice pattern change over a small time interval, humans typically operate on hour interval. However, at NBH level the pattern change can be noticed.
6.2 Energy consumption prediction
We have used Weka [30] in our experiment, it is a collection of open source machine learning algorithms for data mining tasks. The performance of each of the five algorithms discussed in the previous section is measured in terms of the following metrics:
-
1.
Mean Absolute Error (MAE): measures the average absolute differences between the predicted value and the actual value in the validation dataset (see Equation (7)).
-
2.
Root Mean Squared Error (RMSE): measures the square root of the average of squared differences between the predicted value and the actual value in the validation dataset (explained previously) (6)).
-
3.
Running time (in seconds): the time taken to build the model
-
4.
Model size (KB): the size of the prediction model in kilobytes
(7) |
We can see from the results of the energy consumption prediction of 500 customers in Table 3, that M5P algorithm gives the smallest average error rate within a reasonable running time and with low memory requirement. Therefore, M5P constitutes the best algorithm to use for SH energy prediction. The MLP algorithm shows the highest error rates and the longest running time. The random forest presents a huge memory usage in comparison with the other algorithms. Concerning the NBH energy prediction, table 4 shows that REPTree algorithm provides the best trade-off between error rates, running time and memory requirement. Therefore, we choose REPTree algorithm for NHB energy prediction, and M5P algorithm for SH energy prediction.
Algorithm | MAE | RMSE | Running Time (s) | Model Size (KB) |
---|---|---|---|---|
REPTree | 0.395 | 0.534 | 0.123 | 9.979 |
M5P | 0.329 | 0.453 | 0.724 | 13.273 |
RandomForest | 0.403 | 0.549 | 3.366 | 3,810.904 |
SVM | 0.372 | 0.508 | 6.132 | 110.735 |
MLP | 0.426 | 0.562 | 17.263 | 16.286 |
Algorithm | MAE | RMSE | Running Time (s) | Model Size (KB) |
---|---|---|---|---|
REPTree | 351,803 | 478,770 | 5,000 | 113,000 |
M5P | 353,312 | 480,546 | 21,000 | 86,000 |
Random Forest | 350,087 | 476,013 | 59,000 | 11386,000 |
SVM | 585,336 | 773,824 | 12832,000 | 2709,000 |
MLP | 451,850 | 582,765 | 246,000 | 15,000 |
6.3 Overloading cyberattacks detection
To the best of our knowledge, no real smart grid AMI transaction dataset including overloading cyberattacks data is publicly available. Thus, we simulate the power overloading cyberattacks against ILC/DLC discussed in Section 5 for 500 customers. We implement theses attacks based on datasets of normal samples, for each instance of the dataset we generate four types of malicious samples as follows (refer to table 5 for variable description):
-
1.
Attack of type 1: this attack simulates forming peak energy load, where the attacker attempts to overload the grid during times of high demand when the grid becomes under pressure:
Where e is the normal consumption value and M is the modified consumption value.
-
2.
Attack of type 2: this attack simulates bill reduction cyberattack, where the attacker manipulates the guideline price with a low price from to to urge customers in the community to schedule energy during this period, and a high price at other time slots during which he can schedule his energy load. Thus, the energy load increases from to .
-
3.
Attack of type 3: to ensure a higher impact, the attacker may attempt to create a sharp energy increase. This attack simulates a variant of forming peak energy cyberattack. In this case, the amount of energy increase is greater than in the case of attack of type 1.
-
4.
Attack of type 4: this attack simulates increasing load fluctuation cyberattack. The attacker alternates repeatedly between normal behavior and grid overloading to disturb the grid.
![Refer to caption](x6.png)
![Refer to caption](x7.png)
Variables Descriptions M1 Malicious consumption pattern generated through attack of type 1 M2 Malicious consumption pattern generated through attack of type 2 Normal consumption starting time of peak hours, e.g. 7 am ending time of peak hours, e.g., 10 pm the amount of electricity increase in attack of type 1 the amount of electricity increase in attack of type 2 attack of type 2 starting time attack of type 2 ending time minOffTime attack of type 2 minimal duration, e.g. 4 hours
Figure 6(a) shows an example of the energy consumption of a particular customer during a single day. Figure 6(b) illustrates the corresponding attack patterns.
We simulated the same four attack types on the neighborhood dataset, we implemented the attacks based on NBH dataset of normal samples. For each instance of the NBH dataset, we generated four types of malicious samples in the same way as described previously. We adjust the amount of energy consumption increase based on the neighborhood average consumption. The performance of the anomaly detection algorithms is measured in terms of the following metrics: Accuracy (AC); True Positive rate (TPR); False Positive Rate (FPR); True Negative Rate (TNR); and False Negative Rate (FNR). As we can see in Table 6, the average RMSE on SH attack samples (RMSE-A) deviates considerably from the average RMSE on SH normal samples (RMSE) regardless of the attack type. The deviation is more considerable in the case of attack of types 3 and 4 because the amount of energy increase is more important. The SH anomaly detection algorithm shows high detection performances. It delivers high accuracy and detection rate with low false positive and false negative rates. We observe the best detection rate on attack of type 4, and the lowest false positive rate on attack of type 1.
To highlight the trade-off between TPR and FPR, we relied on the Receiver Operator Characteristic (ROC) curve which plots the TPR (y-axis) against the FPR (x-axis). Figure 7 shows the ROC curves of three customers with best, intermediate, and worst performances of attack of types 1, 2, 3, 4, and all the attack types combined, respectively. As we can notice, the curves are closer to the top-left corner indicating a good performance on detecting the four attack types combined or separated. The ROC curve 7(d) confirms that CPADF delivers the best detection performances on attack of type 4. Figure 7(e) shows the capacity of CPADF to maintain high detection rate with low false positive rate against all attack types combined. A summary of the NBH anomaly detection results is listed in Table 7, the NBH detection algorithm shows high detection performance. We observe the best detection rate on attack of type 3, and the lowest false positive rate on attack of type 1.
![Refer to caption](x8.png)
![Refer to caption](x9.png)
![Refer to caption](x10.png)
![Refer to caption](x11.png)
![Refer to caption](x12.png)
RMSE | RMSE-A | AC | TPR | FPR | TNR | FNR | |
---|---|---|---|---|---|---|---|
Type 1 | 0.332 | 0.965 | 0.901 | 0.918 | 0.104 | 0.896 | 0.082 |
Type 2 | 0.332 | 0.942 | 0.903 | 0.920 | 0.111 | 0.889 | 0.080 |
Type 3 | 0.332 | 2.625 | 0.924 | 0.989 | 0.120 | 0.880 | 0.011 |
Type 4 | 0.332 | 2.617 | 0.947 | 0.991 | 0.120 | 0.880 | 0.009 |
All | 0.332 | 2.673 | 0.907 | 0.965 | 0.161 | 0.839 | 0.035 |
RMSE | RMSE-A | AC | TPR | FPR | TNR | FNR | |
---|---|---|---|---|---|---|---|
Type 1 | 478.770 | 1168.923 | 0.890 | 0.882 | 0.108 | 0.892 | 0.118 |
Type 2 | 478.770 | 1130.237 | 0.893 | 0.909 | 0.121 | 0.879 | 0.091 |
Type 3 | 478.770 | 2678.249 | 0.899 | 0.998 | 0.168 | 0.832 | 0.002 |
Type 4 | 478.770 | 2687.301 | 0.931 | 0.993 | 0.168 | 0.832 | 0.007 |
All | 478.770 | 2923.112 | 0.901 | 0.958 | 0.166 | 0.834 | 0.042 |
6.4 Discussion and comparison
The CPADF shows high accuracy on detecting the four attack types combined or separated, at both SH and NBH levels. However, in the context of smart grids, the two classes (attack and normal) are not equally important. It is known that TPR would be the metric to use when there is a high impact associated with false negative (attack classified as normal). It is safer for the system to tolerate false positive (normal consumption change detected as attack) rather than false negative. The impact of false negative would be extremely high if the target system is connected to other systems (cascading failures). Against all attacks combined, the TPR is higher than 96 %, and the FNR is less than 4 %. The superior TPR on detecting attack types 3 and 4 shows the effectiveness of CPADF when there are drastic changes in consumption patterns, as illustrated in Figure 8. The highest FNR is noticed on attack of type 1, due the fact that during peak hours, differentiating between legitimate and malicious consumption increase is more challenging. Furthermore, this is in part because the random generation of the amount of energy increase can in some cases return consumption values which are close to normal consumption values. Due the aforementioned facts, a slight drop in TPR at NBH level can be observed in the cases of attack types 1 and 2 (see Figure 8). The results showed the effectiveness and high performances of CPADF on detecting different types of overloading cyberattacks at SH and NBH levels.
According to [25] an anomaly-based detection system must fulfil a set of requirements to be suitable to the smart grid context: operational performance ([R1]); reliability and integrity in the control ([R2]); resilience ([R3]); security ([R4]) and privacy ([R5]). CPADF complies with security and resilience requirements ([R3, R4, R5]) thanks to the periodic retraining ensuring incremental learning to update the knowledge of the system with new legitimate consumption patterns. Using RMSE in threshold calculation allows controlling subtle changes, while two-level monitoring (home and neighborhood) of the consumption load enables controlling drastic changes in electricity consumption and load demand. The decision trees low computational complexity and fast learning, along with their comprehensible outputs to humans [25], makes CPADF meets the operational requirement ([R1]). Furthermore, CPADF two-level monitoring, accuracy and low false positive/negative rate allows understanding the electricity consumption changes so as to act accordingly ([R2]).
![Refer to caption](x13.png)
To the best of our knowledge, there are only three papers [17, 18, 10] which have used the same dataset [19] for AMI anomaly detection. Ford et al. [17] and Cody et al. [18] used neural network and decision tree, receptively, to detect two types of energy fraud, whereas Jokar et al [10] used SVM based classification to detect energy theft. Since the performance of anomaly detection depends on the accuracy of energy prediction, we first compare the energy prediction performance of CPADF with Ford et al. [17] and Cody et al. [18]. For the sake of fairness, we consider the same experiments used in [17, 18]. The aim of the first experiment is to evaluate to which extent the regression model can predict electricity consumption for the same month a year after the training set, as in [17, 18], we exploited August 2009 for training, and August 2010 for validation. Experiment 2 examines the ability to predict electricity consumption the week following several weeks, as in [17, 18] we considered weeks from September. To evaluate the ability of electricity prediction within the same weather season, experiment 3 uses electricity consumption from June 2010 for training, then validated the model on July of the same year. The three experiment results are presented in Figure 9, as we can notice CPADF provides the lowest root mean squared error for the three experiments.
![Refer to caption](x14.png)
Table 8 displays a comparison between the anomaly detection overall performances of CPADF, [17], [18] and [10]. As we can see, CPADF provides the best detection rate and the lowest prediction error (RMSE), however CPADF presents 0.6% of extra FPR in comparison with [10]. The proposed system in [10] uses synthetic malicious samples to build the system, which may cause FNR to increase when the malicious pattern changes, because the classifier would not detect attack types that deviate significantly from the synthetic malicious samples used to train the system.
7 Conclusion
In this paper, grid overloading cyberattacks in the context of smart grid AMI are considered. These cyberattacks aim at increasing the energy usage and load fluctuation to disturb the power grid and cause a large area blackout. After analyzing them, CPADF a distributed anomaly detection system based on regression decision trees is proposed. CPADF relies on the predictability of smart home and neighborhood consumption patterns. We showed that CPADF can detect grid overloading cyberattacks regardless of the strategy employed by the attacker and with an optimal detection delay. The simulation results on a real dataset of 500 customers demonstrate that CPADF provides a high detection rate and a low false positive rate with short running time and memory requirement. As future work, we need to explore more cyberattacks and to improve the anomaly detection algorithm using more sophisticated machine learning methods.
References
-
[1]
P. Jokar, N. Arianpoo, V. C. Leung, Intrusion detection in advanced metering infrastructure based on consumption pattern, in: 2013 IEEE International Conference on Communications (ICC), IEEE, 2013, pp. 4472–4476.
doi:10.1109/ICC.2013.6655271.
URL http://ieeexplore.ieee.org/document/6655271/ -
[2]
Y. Liu, S. Hu, T.-Y. Ho, Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks, in: 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), IEEE, 2014, pp. 183–190.
doi:10.1109/ICCAD.2014.7001350.
URL http://ieeexplore.ieee.org/document/7001350/ -
[3]
Y. Liu, S. Hu, T.-Y. Ho, Leveraging Strategic Detection Techniques for Smart Home Pricing Cyberattacks, IEEE Transactions on Dependable and Secure Computing 13 (2) (2016) 220–235.
doi:10.1109/TDSC.2015.2427841.
URL http://ieeexplore.ieee.org/document/7115920/ -
[4]
Y. Liu, S. Hu, A. Y. Zomaya, The Hierarchical Smart Home Cyberattack Detection Considering Power Overloading and Frequency Disturbance, IEEE Transactions on Industrial Informatics 12 (5) (2016) 1973–1983.
doi:10.1109/TII.2016.2591911.
URL http://ieeexplore.ieee.org/document/7515006/ -
[5]
C. Alcaraz, J. Lopez, Wasam: A dynamic wide-area situational awareness model for critical domains in smart grids, Future Generation Computer Systems 30 (2014) 146 – 154, special Issue on Extreme Scale Parallel Architectures and Systems, Cryptography in Cloud Computing and Recent Advances in Parallel and Distributed Systems, ICPADS 2012 Selected Papers.
doi:https://doi.org/10.1016/j.future.2013.06.030.
URL http://www.sciencedirect.com/science/article/pii/S0167739X13001441 - [6] J. Giraldo, A. Cárdenas, N. Quijano, Integrity attacks on real-time pricing in smart grids: Impact and countermeasures, IEEE Transactions on Smart Grid 8 (5) (2017) 2249–2257. doi:10.1109/TSG.2016.2521339.
- [7] S. A. Foroutan, F. R. Salmasi, Detection of false data injection attacks against state estimation in smart grids based on a mixture gaussian distribution learning method, IET Cyber-Physical Systems: Theory Applications 2 (4) (2017) 161–171. doi:10.1049/iet-cps.2017.0013.
- [8] Y. Zhou, Y. Liu, S. Hu, Smart home cyberattack detection framework for sponsor incentive attacks, IEEE Transactions on Smart Grid (2017) 1–1doi:10.1109/TSG.2017.2781695.
- [9] Y. Zhou, X. Chen, A. Y. Zomaya, L. Wang, S. Hu, A dynamic programming algorithm for leveraging probabilistic detection of energy theft in smart home, IEEE Transactions on Emerging Topics in Computing 3 (4) (2015) 502–513. doi:10.1109/TETC.2015.2484841.
-
[10]
P. Jokar, N. Arianpoo, V. C. M. Leung, Electricity Theft Detection in AMI Using Customers’ Consumption Patterns, IEEE Transactions on Smart Grid 7 (1) (2016) 216–226.
doi:10.1109/TSG.2015.2425222.
URL http://ieeexplore.ieee.org/document/7108042/ - [11] Y. Liu, S. Hu, Cyberthreat analysis and detection for energy theft in social networking of smart homes, IEEE Transactions on Computational Social Systems 2 (4) (2015) 148–158. doi:10.1109/TCSS.2016.2519506.
-
[12]
S.-C. Yip, K. Wong, W.-P. Hew, M.-T. Gan, R. C.-W. Phan, S.-W. Tan, Detection of energy theft and defective smart meters in smart grids using linear regression, International Journal of Electrical Power & Energy Systems 91 (2017) 230–240.
doi:https://doi.org/10.1016/j.ijepes.2017.04.005.
URL http://www.sciencedirect.com/science/article/pii/S0142061516316386 - [13] S. Amin, G. A. Schwartz, A. A. Cardenas, S. S. Sastry, Game-theoretic models of electricity theft detection in smart utility networks: Providing new capabilities with advanced metering infrastructure, IEEE Control Systems 35 (1) (2015) 66–81. doi:10.1109/MCS.2014.2364711.
- [14] M. Zanetti, E. Jamhour, M. Pellenz, M. Penna, V. Zambenedetti, I. Chueiri, A tunable fraud detection system for advanced metering infrastructure using short-lived patterns, IEEE Transactions on Smart Grid (2017) 1–1doi:10.1109/TSG.2017.2753738.
- [15] S.-C. Yip, W.-N. Tan, C. Tan, M.-T. Gan, K. Wong, An anomaly detection framework for identifying energy theft and defective meters in smart grids, International Journal of Electrical Power & Energy Systems 101 (2018) 189 – 203. doi:https://doi.org/10.1016/j.ijepes.2018.03.025.
-
[16]
S.-C. Yip, K. Wong, W.-P. Hew, M.-T. Gan, R. C.-W. Phan, S.-W. Tan, Detection of energy theft and defective smart meters in smart grids using linear regression, International Journal of Electrical Power & Energy Systems 91 (2017) 230 – 240.
doi:https://doi.org/10.1016/j.ijepes.2017.04.005.
URL http://www.sciencedirect.com/science/article/pii/S0142061516316386 - [17] V. Ford, A. Siraj, W. Eberle, Smart grid energy fraud detection using artificial neural networks, in: 2014 IEEE Symposium on Computational Intelligence Applications in Smart Grid (CIASG), 2014, pp. 1–6. doi:10.1109/CIASG.2014.7011557.
- [18] C. Cody, V. Ford, A. Siraj, Decision tree learning for fraud detection in consumer energy consumption, in: 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), 2015, pp. 1175–1179. doi:10.1109/ICMLA.2015.80.
-
[19]
Irish social science data archive. [online]. available:.
URL http://www.ucd.ie/issda/data/commissionforenergyregulationcer/ -
[20]
M. A. Faisal, Z. Aung, J. R. Williams, A. Sanchez, Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study, IEEE Systems Journal 9 (1) (2015) 31–44.
doi:10.1109/JSYST.2013.2294120.
URL http://ieeexplore.ieee.org/document/6720175/ -
[21]
Y. Zhang, L. Wang, W. Sun, R. C. Green II, M. Alam, Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids, IEEE Transactions on Smart Grid 2 (4) (2011) 796–808.
doi:10.1109/TSG.2011.2159818.
URL http://ieeexplore.ieee.org/document/5963752/ -
[22]
Kdd cup 1999 data, 1999. [online]. available:.
URL http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html -
[23]
Y. Guo, C.-W. Ten, S. Hu, W. W. Weaver, Preventive Maintenance for Advanced Metering Infrastructure Against Malware Propagation, IEEE Transactions on Smart Grid 7 (3) (2016) 1314–1328.
doi:10.1109/TSG.2015.2453342.
URL http://ieeexplore.ieee.org/document/7182779/ - [24] C. Alcaraz, J. Lopez, S. Wolthusen, Ocpp protocol: Security threats and challenges, IEEE Transactions on Smart Grid 8 (5) (2017) 2452–2459 .
- [25] C. Alcaraz, L. Cazorla, G. Fernandez, Context-awareness using anomaly-based detectors for smart grid domains, in: J. Lopez, I. Ray, B. Crispo (Eds.), Risks and Security of Internet and Systems, Springer International Publishing, Cham, 2015, pp. 17–34.
-
[26]
N. Komninos, E. Philippou, A. Pitsillides, Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures, IEEE Communications Surveys & Tutorials 16 (4) (2014) 1933–1954.
doi:10.1109/COMST.2014.2320093.
URL http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6805165 -
[27]
I. H. Witten, E. Frank, M. a. Hall, Data Mining: Practical Machine Learning Tools and Techniques, Third Edition, Vol. 54, 2011.
arXiv:arXiv:1011.1669v3, doi:10.1002/1521-3773(20010316)40:6<9823::AID-ANIE9823>3.3.CO;2-C.
URL http://www.cs.waikato.ac.nz/{~}ml/weka/book.html{%}5Cnhttp://www.amazon.com/Data-Mining-Practical-Techniques-Management/dp/0123748569 -
[28]
L. Breiman, Random forests, Machine Learning 45 (1) (2001) 5–32.
doi:10.1023/A:1010933404324.
URL https://doi.org/10.1023/A:1010933404324 -
[29]
M. Suganyadevi, C. Babulal, Support Vector Regression Model for the prediction of Loadability Margin of a Power System, Applied Soft Computing 24 (2014) 304–315.
doi:10.1016/j.asoc.2014.07.015.
URL http://linkinghub.elsevier.com/retrieve/pii/S1568494614003469 -
[30]
The university of waikato, “weka 3: Data mining software in java” cs.waikato.ac.nz. [online]. [accessed: February 3, 2018].
URL https://www.cs.waikato.ac.nz/ml/weka/citing.html