Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid

  • Yuancheng Li,

    Roles Formal analysis

    Affiliation Department of Control and Computer Engineering, North China Electric Power University, Beijing, China

  • Rixuan Qiu ,

    Roles Writing – original draft, Writing – review & editing

    rxqiu@ncepu.edu.cn

    Affiliation Department of Control and Computer Engineering, North China Electric Power University, Beijing, China

  • Sitong Jing

    Roles Writing – review & editing

    Affiliation Department of Control and Computer Engineering, North China Electric Power University, Beijing, China

Abstract

Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can’t satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy.

Introduction

To achieve dynamic charging capability, Advanced Metering Infrastructure uses Smart Meters(SM), two-way communication system, Home Area Network(HAN) and Metering Data Management System(MDMS) to establish communication links with users [1]. The communication process of AMI deploys a common communication protocol to meet the requirements of interconnection, which because the terminal devices of the client and part of the communication network are in an open form.

With the significant increase in the number of access points and detection paths, the probability of information security accidents will increase greatly due to the openness of information technology and the characteristics of users [2]. Computer malware represents a direct threat to the smart meter, through disconnecting the batch control switch, the blackout of numerous users will occur, and illegal users can steal information that records smart meter and electricity pricing information, even tamper the power data.

AMI computing, storage, and communication resources are limited, so it is not yet feasible that installing anti-virus software in the AMI and keep it updated [3]. Intrusion detection is based on certain rules or statistical analysis, which through collecting and analyzing audit records, security logs, user’s behavior, network packets, other information in the key points of the computer system and network to check the signs that are violated the security policy of the invasion or attacked in the network or system.

In order to ensure the security of AMI system, the academia, electric power operators and regulatory agencies have carried out information security research for the AMI system. NIST and Open Smart Grid put forward many research reports on information security [4]. Detection technology can monitor the running status of the system and discover various attack behaviors or attack results, which can effectively guarantee the confidentiality, integrity, and availability of system resources. In [5], a collaborative intrusion detection mechanism for AMI security is proposed and the constraint computing and storage resources of the smart meter are taking into account in the meantime. A new intrusion detection system framework based on data flow mining algorithm is proposed for the whole AMI system and it analyze the performance with an IDS dataset [6], which consists of three different levels of intrusion detection system. For the technology of intrusion detection, an intrusion detection model based on least squares support vector machine is proposed in [7], which uses commonly used information feature extraction algorithm to obtain linear and nonlinear dependent data features. In [8], a new hybrid intrusion detection learning model based on density, cluster center, and the nearest neighbor is proposed. In [9], a new detection method is proposed for network attack in the industrial control system. [10] divides the network traffic into multiple distributed intrusion detection systems to improve the detection rate of network attacks and balance the load of the intrusion detection system. A systematic approach is proposed to establish a hybrid intrusion detection system in [11]. The learning interval is based on the power system state specification, including normal control operation and cyberattacks, which employ a common-path mining technology from the synchronous measurement data and the system audit log mining related information, so establish the learning model accurately. Zhang et al. [12] uses the support vector machine (SVM) and artificial immune system (AIS) to detect and classify malicious data and possible cyberattacks. To deal with Distributed Denial of Service (DDoS) attack on the AMI network. [13] introduces honey into the AMI network as a decoy system to detect and gather attack information. Ntalampiras [14] proposes a novel methodology for automatic identification of integrity attacks and applies the approach to data coming from the IEEE-9 bus model, In addition, he proposed an anomaly-based methodology for reliable detection of integrity attacks in cyber-physical critical infrastructures in [15]. In [1618], an overview of machine learning methods and the data mining algorithms in the intrusion detection system was provided.

The research of network intrusion detection technology is developing rapidly, existing work such as [6], [12], [13] is closely related to our work. However, Zhang et al. [12] focus on the intrusion detection in complete smart grid rather than aim at the security in AMI. Wang et al. [13] pay more attention to DDoS which is just one type of attack types, whereas we concentrate on performance and effectiveness with various of attack types in whole IDS. Zhang et al. did not give a specific comparison of used classifiers, which is outmoded. The algorithms used in our work such as ELM was proposed about a decade ago. The method which is proposed by [12] and [13] needs to set lots of training parameters artificially and leads to local optimum easily, in addition, [12] emphasized data-mining-based IDS using data stream mining in network layer in open systems interconnection (OSI) model and [8] specification-based IDS due to controlled network in AMI.

Which is characterized by the historical data in batches to train and support the number of samples can be changed, each round of training process training algorithm only enter the current batch of data and update the network weight, without duplication of historical data, generalization ability, taking into account the AMI system data will inevitably be data errors or missing cases, so the OS-ELM algorithm is more suitable for the needs of practical applications.

The main contributions of this paper are as follows: Firstly, sample and preprocess the data set, the method of gain rate evaluation is used to reduce the dimension of the data, and compared with other kinds of dimensionality reduction methods to verify its validity. Then, an intrusion detection system based on OS-ELM is proposed. A large number of experiments are carried out to validate the parameter selection using the current data set, and the parameters which are most suitable for the system model are determined. Finally, the OS-ELM detection algorithm is compared with other detection algorithms to verify the feasibility of the proposed method.

The remainder of the paper is organized as follows: The next section describes system model; the third section puts forward the OS-ELM based intrusion detection model; the fourth section analyzes and compares the experimental results; the final section contains a conclusion of the dissertation.

The components and security analysis of AMI

Components of AMI system

The structure of the smart grid includes four parts: Advanced Metering Infrastructure (AMI), Advanced Distribution Operation (ADO), Advanced Transmission Operation (ATO) and Advanced Asset Management (AAM) [19]. The AMI is a complete network processing system that includes measure, collect, store, analyze and information utilizes the user’s power consumption, which provides the communication and control functions for the smart grid [20]. In order to achieve fine-grained pricing mechanism, measure automation, demand response, promote quality management functions, promote two-way interaction between power system and users, and promote users’ rational use of electricity to provide technical basis.

AMI system consists of Smart Meter (SM), two-way communication system, Home Area Network (HAN), and Meter Data Management System (MDMS) [21]. The HAN enhances user’s experience of the electricity by adding the intelligent management unit. The metering data, which is collected by the smart meter, is sent to the MDMS via a bi-directional communication channel. The MDMS system is a database management system with an analysis tool that handles the measurement values store in the AMI database. Smart meters support instant reading and verify the user’s power consumption information, remote on and off, device interference and steal detection, time-of-use price, real-time price and other functions. The two-way communication network is AMI communications infrastructure that connects smart meters to MDMS. As shown in Fig 1:

Security analysis of AMI system

AMI is mainly confronted with security issues, which are divided into two categories: the objective threat usually dues to the existence of communication systems or information system failures and the staff misuse; the subjective threat generally refers to a premeditated attack. There are various potential security problems on AMI as follows [22]:

Integrity security: data integrity is crucial in data delivery that between the sender and the receiver, since its violation not only can cause incorrect billing but also can launch malicious control commands towards AMI, which may result in a massive power outage.

Availability security: data availability threats will lead to buffer overflow, data loss on the collector side and cause a delay in data delivery, even data loss at the endpoints because of limited link bandwidth.

Common Network security: the types of threats include endpoint DoS, link flooding, wireless link jamming and so on.

Security issues for AMI in the smart grid have been widely studied. For example, many compromised collectors can launch DoS attack to headend [23]. Wireless communications in AMI are always threatened, so an AMI security framework based on information center network is proposed. The proposed framework can guarantee the stability and security of AMI system [24], The widespread deployment of AMI has had quite an opposite effect by fueling new ways to steal power and energy theft, which may cause enormous economic losses, [25,26] propose a detection mode which is mainly used to solve the power theft problem in AMI and the experimental shows that the model can detect various types of energy theft attempts accurately using individually inaccurate sensors. Under the background of continuously increasing traffic in AMI, finding a solution to meet the traffic requirements of AMI. [2728] propose a public key cryptosystem security framework for AMI wireless network communication, which based on the creation of certificates and revocation of certificates to ensure system access security. [29] presents a layered specification-based IDS for HAN in AMI, paper defines specifications that extract from the IEEE standard as the normal behavior and the specifications deviations from the normal behavior can be malicious activities and we use the machine learning method to learn the characteristics of attack data. The intrusion detection problem can be as a two classification problem; we use of OS-ELM method for classification to achieve detection.

Intrusion detection model based on OS-ELM

The basic ideas and algorithm principles of ELM

Extreme Learning Machine (ELM) is a kind of generalized single hidden layer feedforward neural network (SLFNs). It uses the gradient-based learning algorithm to train the network, which is different from the traditional learning method and iteratively adjusting all parameters in the network. The traditional neural network needs to be set a large amount of training parameter when learning algorithm (back propagation algorithm) and it’s easy to produce the local optimal solution. For ELM, only the parameter of the optimal number of hidden units needs to be determined and assigns the input weights and hidden layer thresholds randomly. The output layer weights are calculated directly by the least squares method. The entire learning process does not require an iteration to complete, so it has been shown extremely fast with generalization performance better than the traditional learning algorithm. The ELM algorithm is described as follows:

GivenN different sample {(xi, ti), i = 1, ⋯, N}, which xi = (xi1, xi2, ⋯, xin)TRn, ti = (ti1, ti2, ⋯, tin)TRm, the mathematical model of singe-hidden layer feedforward networks (SLFNS) with L implicit nodes is: (1)

Which αi = (αi1, αi2, ⋯, αin)T and bi are the input weight and bias value of the ith implicit node respectively, βi = (βi1, βi2, ⋯, βim) is the output weight of the connected with implicit node and output layer, gi(xj) = G(αi, bi, xj) represents the output xj of the ith implicit node on the output.

If the actual output of the network is equal to the desired output, there is: (2)

The above N equations can be written as matrices: (3) (4) (5)

H is called the hidden layer output matrix, where the ith row represents the output of the ith input xj with respect to the hidden layer, the jth column shows the output of all input x1, x2, ⋯, xN with respect to the jth implicit node.

In the ELM algorithm, the input weight α and the bias b are randomly selected from a continuous probability distribution, so that the Eq (3) is a linear equation with variable β. Solve the linear system is equivalent to finding the minimum output weight So that the error ‖T‖ is minimized. Using the least squares method to calculate , the solution can be expressed as: (6)

The steps of the ELM algorithm are as follows: Given a training data set Ω = {(xi, ti)|xiRn, tiRm, i = 1, 2, ⋯, N}, Activation function g: RR and L implied points.

  1. Randomly select the input weights αi and the bias bi, i = 1, ⋯, L.
  2. Calculate the hidden layer output matrix H
  3. Calculate the output weights , there T = (t1, t2, ⋯, tN)T.

Principle and model of OS-ELM

Traditional ELM algorithm using batch learning model will begin a study after all data are transmitted to the system. However, it is practical that original data will arrive consecutively, and has no prior knowledge as to how many training observations will be presented. Therefore, taking into account the idea of online sequences and in [30] proposed online sequence limit learning machine (OS-ELM) to avoid the repetitive training through the method where only newly arrived data can be seen and the training observations are discard as soon as the learning procedure is completed. So OS-ELM is appropriate for intrusion detection in AMI.

Online sequence ELM algorithm implementation steps: Given a training data set Ω = {(xi, ti)|xiRn, tiRm, i = 1, 2, ⋯, N}, the hidden layer and output functions G(αi, bi, x), the number of hidden nodes is L.

Step 1: Initialize phase: Select a partial dataset from

  1. Randomly select the input weights αi and the bias bi, i = 1, ⋯, L.
  2. Calculate the hidden layer output matrix H0, there (7)
  3. Calculate the initial output weights , there .
  4. set k = 0.

Step 2: Sequence learning stage: Suppose that the data block added is in k + 1 step, there Nk+1 indicates the number of data added in step k + 1.

  1. Compute the hidden layer output matrix Hk+1 for newly added data, there(8)
  2. set .
  3. Calculate the output weights βk+1, there (9)
  4. set k = k + 1, return to step 2.

When N0 = N, OS-ELM algorithm is equivalent to the original ELM algorithm, OS-ELM algorithm can not only learn data one by one but also to learn data block by block and abandon the data which have been studied immediately after the end of learning.

Self-fitting OS-ELM

In sequential learning, some partial training data arrives in time sequential fashion: {(x(0), t(0)), (x(1), t(1)), ⋯, (x(k), t(k))}, Learning is the process of constructing function to map between observation and its nature called (class). When the number of training data N, we need to address the expected value of .

Learning from the data Ωn is the process to select a function βn from a class of by minimizing the empirical squared error with the error probability of the resulting classifier. The empirical squared error minimization is consistent under general conditions.

Based on Law of Large Numbers (LLN) theorem, we can make sure that the consistency of expected value of learning model is Eq (6) , in sequential learning with the number of training data .

Intrusion detection model based on OS-ELM

Data preprocessing phase.

In this model, the original data is firstly preprocessed and partial data of the original data set are randomly selected as the sample data set due to take into account a large amount of original data, the character data in the data set is transformed into Digital data and then normalize the data. After the processing of the original data is completed, considering the time complexity and computational efficiency, we will use the Gain Ratio Evaluation method to reduce the dimension of the experimental data. Gain ratio evaluation is a filtering feature selection method based on information metrics and information gain is the most important and useful feature of data selection. The information gain calculates the importance of information on the amount of information brought about by each feature before and after information is added to the data set and assesses the significance of the feature to the entire data.

Let X, Y be random variables, the information entropy of X and the entropy of Y with regard to X are defined as: (10) (11)

Information gain is expressed as the difference of information entropy, defined as: (12)

Eq 12 can also be written as: (13)

Information gain calculates the category appears in the category of information gain for a feature, that is feature before and after the appearance of information entropy difference in the feature selection. The greater the information gain of a feature, the more important its contribution to the taxonomy. But the information gain method is biased from a large number of attribute values to select the appropriate property and lead to over-fitting easily. Therefore, we use the gain ratio and intrinsic information extraction method. Eq 14 reflects the entropy of all sample probability distributions, and Eq 15 reflects the relationship between the gain ratio and the information gain.

(14)(15)

Initialization phase.

Firstly, a part of data set is selected as training data set to initialize the network, and the number of hidden nodes is set to L, then the input weight and bias value of hidden layer nodes are selected randomly, calculate the hidden layer output matrix and initial output weight Value to complete the initialization phase.

Online sequence learning phase.

Given the kth data segment, update the hidden-layer output matrix and the initial output weight, set k = k + 1, then return to the previous iterative update process. Test on the training data if the current training data training is completed and output the accuracy, the output of the initial value of the hidden layer, If the data is added during the training process, the update process will be repeated until all the training data have been trained, thus completing the online learning phase. The specific process is shown in Fig 2:

thumbnail
Fig 2. Flow chart of intrusion detection model based on OS-ELM.

https://doi.org/10.1371/journal.pone.0192216.g002

Experimental results and analysis

Analysis of experimental data sets

The evaluation utilizes a data-set from Advanced Metering Infrastructure (AMI) contain up to 33 million lines of data. This data-set corresponds to 1-day worth of data on August 1, 2012 with up to 2373 smart meters [31], We can get the data set from http://www.ucd.ie/issda/data/commissionforenergyregulationcer/.

In general, smart meter data are in the form of time series and are arranged in such a way that they appear as tuples. The smart meters that record samples every 15 minutes and every 1 minute have been identified, the data file format is as shown in Table 1:

The model was trained ten times and each time used random sampling and the training data is composed of 120000 samples and the testing data compose of 20000 samples of records which is randomly selected from the complete data set.

Evaluation indicators

Intrusion detection evaluation from the performance point of view to verify the effectiveness of the intrusion detection method and feasibility of this article using the accuracy rate, false positive rate and false negative rate, training time and test time five indicators.

  1. TN (True Negative) Indicates the number of which normal data is correctly recognized as normal data.
  2. FN (False Negative) Indicates that number of which normal data is recognized as an alarm.
  3. TP (True Positive) Indicates the number of which alarm is correctly recognized as an alarm.
  4. FP (False Positive) Indicates the number of which alarm is recognized as normal data

Therefore, three definitions of indicators can be described as follows:

  1. Accuracy Rate: , the higher the accuracy rate, the better the algorithm.
  2. False Positive Rate: , the lower the false positive rate, the better the algorithm.
  3. False Negative Rate: , the lower the false negative rate, the better the algorithm.

Feature selection

In order to improve the efficiency of the detection system and reduce computational losses, we use the method of gain rate evaluation to characterize the data. A typical feature extraction process is shown in Fig 3:

According to the requirement of accuracy and computational complexity, an attribute value below the threshold value may be considered to have minimal influence and is removed in actual use. The use of dimensionality reduction data can effectively reduce the computational complexity and improve the performance of the algorithm. The gain ratio threshold is selected and the relevant experiments are performed in the subsequent experiments and the appropriate values are selected based on the experimental results.

Experimental design and experimental results

Gain ratio threshold and feature selection.

The main process of machine learning is to construct a classifier by using training data for a data sample and further classify the samples by classifier. However, it is not easy to deal with the data with high dimensionality, and the time complexity of the algorithm will increase with the increase of the dimension. So we need to use the method of reducing the feature dimension.

In order to validate the effectiveness and feasibility of the proposed method, we compare this method with Fisher, Relief, mRMR and InfoGain, which are the methods of feature selection in this paper.

In the same system environment, the OS-ELM algorithm with the number of hidden nodes is 200, and the activation function selects sigmoid function and the initial block selection is 300, which use 2 fold cross-test method and repeat 10 experiments. It documents the accuracy of various classification algorithms and the running time of the algorithm under different dimensions. Experimental results are shown in Fig 4:

The abscissa represents the running times of the algorithm and the ordinate represents the execution time of the algorithm in Fig 4. From the training time curve of each dimension in the graph, we can see that the training time of the learning algorithm can be reduced effectively after the feather selection. The shorter the dimension, the shorter the training time. The following experiment will validate the accuracy of each algorithm in each dimension to help us select the appropriate dimension.

In the experiment, each algorithm was used to extract the experimental data, and then double cross-validation was used to measure the accuracy. Those are as shown in Fig 5:

thumbnail
Fig 5.

(a) Comparison of the accuracy rate of the classification algorithm and (b) The accuracy of 11 to 18 dimensions.

https://doi.org/10.1371/journal.pone.0192216.g005

From the above experiment we can see that the results of eighteen experiments that start from the first feature and the successive addition of a feature, until the sort of the first fifteen characteristics of the algorithm to join the results. It can be seen from Fig 5(a) that the accuracy of Gain Ratio, Fisher, ReliefF, and InfoGain begins to stabilize when the fifth feature is introduced. mRMR begins to stabilize after introducing the seventh feature. After the introduction of the tenth feature, the accuracy rate increases slowly with the increase of the feature number and the growth rate slows down. As can be seen from the Fig 5, when the number of features selected more than fifteen, the accuracy rate has stabilized, no significant growth. In order to facilitate the selection of the algorithm, we combine the ten features to the eighteen features in this interval as shown in Fig 5(b).

It can be seen that the accuracy of Gain Ratio is relatively high under the same feature number, which indicates that the Gain Ratio algorithm is more suitable for the OS-ELM algorithm. The accuracy can reach a satisfactory result when the subset of the feature is selected to fifteen features. Feature selection can effectively reduce the running time of the algorithm under the condition of guaranteeing the classification accuracy and it is very effective and feasible in intrusion detection. It can not only improve the efficiency of intrusion detection system but also the description of the attack is also significant. By defining key features, it can help to propose key indicators of specific attacks from different levels of attack description.

The parameters selection of OS-ELM.

In the intrusion detection algorithm based on OS-ELM, the parameters are considered including the choice of excitation function, the number of hidden layer nodes, the number of initial nodes and the size of the block. The empirical parameter selection can only determine an approximate range, continue to compare experimentally and then adjust the final result to get an ideal parameter for this model when it is necessary. The following experiments are carried out based on the above.

A. The choice of activation function: Four different activation functions including the ‘sin’, ‘RBF’, ‘sigmoid’ and "hardlim" functions are used in this experiment. Fig 6(a) shows how the accuracy varies with the number of hidden nodes in the case of different excitation functions. We can see that the ‘RBF’ function has the worst performance under this experimental data set, the ‘sin’ function is not better than ‘hardlim’ and ‘sigmoid’ function. The accuracy of "hardlim" and "sigmoid" functions is similar to high precision, but the "hardlim" function is more stable than the "sigmoid" function. The training time of the ‘RBF’ function is the longest one compared with other functions and the training time of ‘sin’ function is least, but the accuracy rate is not the same as other functions. Fig 6(b) shows the change between training time and a different number of hidden nodes. The training time of the ‘hardlim’ function is shorter than the ‘sigmoid’ function and the curve of the ‘hardlim’ function training time grows smoother and more stable than the ‘sigmoid’, which is with the increase of the number of hidden nodes. So in the follow-up experiments, we will choose ‘hardlim’ function as the activation function.

thumbnail
Fig 6.

(a)The accuracy of different hidden node numbers and (b) the training time of different hidden node numbers.

https://doi.org/10.1371/journal.pone.0192216.g006

B. Selection of the number of blocks: The original ELM algorithm uses a batch mode, that is, all the data are transmitted to the system in each training process. Adding one or a batch of data to the system in the OS-ELM method obviously will be more suitable for real-time intrusion detection. So this experiment will verify the number of blocks selected.

As it can be seen from Table 2, the sequential operation of 1–1 takes the highest time while batch the shortest time and any block mode (10–10,20–20, (10,30)) falls in between. If the block size is large, it approaches the time taken for batch mode operation. OS-ELM method is equivalent to ELM method when the size of the selected block is as the same as the original training sample size, the accuracy and applicability of ELM, which is lower than OS-ELM.

This is because the OE-ELM algorithm introduces the idea of sequence learning, and the data can be added to the network piece by piece, and the original data will be discarded and not used after the completion of the study. The ELM algorithm will put the new data and put the data together to retrain the network, when new data is added to the network. If OS-ELM does not use the sequence of ideas to add a piece of data, then it is equivalent to the ELM algorithm. We choose OS-ELM because all the data is not a one-time added to the network in practice, and ELM will re-train the network in this environment, consume a lot of computing resources. As the amount of data increases and runtime increases, computing resource consumption and training time will increase. So the OS-ELM in the application is more in line with the actual needs of the situation. However, the block size and the overall training time are inversely proportional to the trend, that is because the more block size, the larger training data set and needs more RAM space. When this space exceeds a limit, the procedure slows down. So we consider the impact of the two on the experimental results and finally we choose the size of each block is 20 data.

C. The choice of the number of initial values: The first step is to determine the number of initial values in the above-mentioned initialization phase. The number of initial values are due to different processing problem and the initial values were selected for proposed intrusion detection OS-ELM algorithm, we conduct experiment in different initial value numbers, the experimental results (L = 100, L = 200, L = 300) are shown in the Tables 3, 4 and 5.

thumbnail
Table 3. The influence of the initial value numbers (L = 100).

https://doi.org/10.1371/journal.pone.0192216.t003

thumbnail
Table 4. The influence of the initial value numbers (L = 200).

https://doi.org/10.1371/journal.pone.0192216.t004

thumbnail
Table 5. The influence of the initial value numbers (L = 300).

https://doi.org/10.1371/journal.pone.0192216.t005

It can be seen from the above three experiments that in terms of accuracy, the degree of influence that the absolute difference of the number of implicit nodes and initial values is higher than the degree of influence that the number of implicit nodes and initial values in the accuracy aspect. When the initial value is greater than the number of hidden nodes, the performance of the OS-ELM intrusion detection system proposed is close to optimal.

Performance comparison of OS-ELM algorithm with other algorithms.

In order to verify the effectiveness of the proposed detection system, this section will compare the experimental performance of various algorithms including BP neural network, radial basis function (RBF) network, extreme learning machine (ELM) and online sequence extreme learning machine (OS-ELM). Experimental parameters for training time, accuracy, false positive rate, false negative rate and experimental parameters select the default parameters, the use of 10 times the cross-validation method. The experimental results are shown in the Table 6.

It can be seen from Fig 7(a) and 7(b) that the OS-ELM is faster and more accurate than the BP neural network and RBF radial basis network in training time. Compared with the traditional extreme learning machine, the data input of the intrusion detection system improves the accuracy, false positive rate, and false negative rate are improved and OS-ELM is more effective compared with the batch mode of other algorithms batch mode in the data input in intrusion detection systems.

thumbnail
Fig 7. The results of for the four compared algorithms.

(a) The FNR and FPR Comparison of algorithms. And (b) the Performance Comparison of Algorithms.

https://doi.org/10.1371/journal.pone.0192216.g007

Conclusion

In this paper, we propose an intrusion detection system model based on the online sequential extreme learning machine for advanced measurement infrastructure. In the experiment, we use the gain ratio evaluation method to reduce the dimension of the sample dataset. The OS-ELM algorithm is used to classify and train datasets. Then a large number of experiments are conducted to select the optimal algorithm parameters for the proposed system. Finally, the proposed OS-ELM-based intrusion detection system is compared with other similar algorithms and the experimental results verify the effectiveness and feasibility of the proposed method.

References

  1. 1. Vehbi C. G.; Dilan S.; Taskin K.; Salih E.; Concettina B.; Carlo C.; Gerhard P. H.; Smart Grid Technologies: Communication Technologies and Standards, IEEE Transactions on Industrial Informatics, 2011,7,529–539.
  2. 2. David G. H.; Using AMI to realize the Smart Grid, Power and Energy Society General Meeting—Conversion and Delivery of Electrical Energy in the 21st Century, 2008,1932–5517.
  3. 3. Robin B.; William H. S.; Himanshu K.; Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions, 2010 First IEEE International Conference on Smart Grid Communications, 2010, 350–355
  4. 4. Miao X.; Chen X.; Ma X.; Liu G.; Feng H.; Song X. Comparing Smart Grid technology standards roadmap of the IEC, NIST and SGCC, Electricity Distribution (CICED), China International Conference on, 2012, 5,10–14.
  5. 5. Liu X. X.; Zhu P. D.; Zhang Y.; Chen K. A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure, IEEE Transactions on Smart Grid, 2015, 6,2435–2443.
  6. 6. Faisal M. A.; Aung Z.; Williams J. R.; Sanchez A. Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study, IEEE Systems Journal, 2015, 9,31–44.
  7. 7. Ambusaidi M.A.; He X.J.; Nanda P.; Tan Z.Y. Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm, IEEE Transactions on Computers, 2016, 65,2986–2998.
  8. 8. Wang X.J.; Zhang C.X.; Zheng K.F. Intrusion detection algorithm based on density, cluster centers, and nearest neighbors, China Communications, 2016, 13,24–31.
  9. 9. Ponomarev S.; Atkison T. Industrial Control System Network Intrusion Detection by Telemetry Analysis, IEEE Transactions on Dependable and Secure Computing, 2016, 13,252–260.
  10. 10. Ha T.J.; Yoon S.; Risdianto A.C.; Kim J.W.; Lim H. Suspicious Flow Forwarding for Multiple Intrusion Detection Systems on Software-Defined Networks, IEEE Network, 2016, 30,22–27.
  11. 11. Zhang Y.; Wang L.; Sun W.; Green R. C.; Alam M. Distributed intrusion detection system in a multi-layer network architecture of smart grids, IEEE Trans. Smart Grid, 2011, pp. 796–808,
  12. 12. Wang K.; Du M.; Sabita M.; Sun Y. F. Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid, IEEE Transactions on Smart Grid; 2017, pp,1–1.
  13. 13. Ntalampiras S.; Automatic identification of integrity attacks in cyber-physical systems, Expert Systems with Applications, 2016, 164–173.
  14. 14. Ntalampiras S.; Detection of Integrity Attacks in Cyber-Physical Critical Infrastructures Using Ensemble Modeling, IEEE Transactions on Industrial Informatics, 2015, 11, 104–111.
  15. 15. Pan S.Y.; Morris T. Adhikari U. Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems, IEEE Transactions on Smart Grid, 2015, 6,3104–3113.
  16. 16. Buczak A.L.; Guven E. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection, IEEE Communications Surveys & Tutorials, 2016, 18,1153–1176.
  17. 17. David W.F.; Borghetti B.J.; Sodemann A.A.; A Survey of Distance and Similarity Measures Used Within Network Intrusion Anomaly Detection, IEEE Communications Surveys & Tutorials, 2015, 17,70–91.
  18. 18. Cagri V. G.; Dilan S.; Taskin K.; Salih E.; Concettina B.; Carlo C.; Gerhard P. H. A Survey on Smart Grid Potential Applications and Communication Requirements, IEEE Transactions on Industrial Informatics, 2013, 9, 28–42.
  19. 19. Bai, X. M.; Meng, J. X.; Zhu, N. H. Functional analysis of advanced metering infrastructure in smart grid, International Conference on Power System Technology, 2010, 1–4.
  20. 20. Maharjan S.; Zhu Q.; Zhang Y.; Gjessing S.; Basar T. Demand response management in the smart grid in a large population regime IEEE Transactions Smart Grid, 2016,7, 189–199.
  21. 21. Akkaya K.; Rabieh K.; Mahmoud M.; Tonyali S. Customized Certificate Revocation Lists for IEEE 802.11s-Based Smart Grid AMI Networks, IEEE Transactions on Smart Grid, 2015, 6,2366–2374.
  22. 22. Mohammad, A. R.; Padmalochan, B.; Ehab, A. S.; SmartAnalyzer: A noninvasive security threat analyzer for AMI smart grid, Proceedings—IEEE INFOCOM, 2012, 131 (5): 2255–2263.
  23. 23. Yi, P.; Zhu, T.; Zhang, Q.Q.; Wu, Y.; Li J. H.; A denial of service attack in advanced metering infrastructure network, IEEE International Conference on Communications (ICC), 2014, 1029–1034.
  24. 24. Amin S.; Schwartz G.A.; Cardenas A.A.; Sastry S. S. Game-Theoretic Models of Electricity Theft Detection in Smart Utility Networks: Providing New Capabilities with Advanced Metering Infrastructure, IEEE Control Systems, 2015, 35,66–81.
  25. 25. McLaughlin S.; Holbert B.; Fawa A.; Berthier R.; Zonouz S. A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures, IEEE Journal on elected areas in communications, 2013, 31,1319–1330.
  26. 26. Yu K. P.; Arifuzzaman M.; Wen Z.; Zhang D.; Sato T. A Key Management Scheme for Secure Communications of Information Centric Advanced Metering Infrastructure in Smart Grid, IEEE Transactions on Instrumentation and Measurement, 2015, 64,2072–2085.
  27. 27. Liu N.; Chen J. H.; Zhu L.; Zhang J. H.; He Y. L. A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid, IEEE Transactions on Industrial electronics, 2013, 60,4746–4756.
  28. 28. Allwood G.; Wild G.; Hinckley S. Optical Fiber Sensors in Physical Intrusion Detection Systems: A Review, IEEE Sensors Journal, 2016, 16,5497–5509.
  29. 29. Jokar, Paria, Hasen Nicanfar, and Victor CM Leung. "Specification-based intrusion detection for home area networks in smart grids." Smart Grid Communications (SmartGridComm), 2011 IEEE International Conference on. IEEE, 2011.
  30. 30. Liang N.Y.; Huang G.B. A fast accurate online sequential learning algorithm for feedforward networks, IEEE Transactions on Neural Networks, 2006,1411–1423. pmid:17131657
  31. 31. FL Quilumbagudino, Using Advanced Metering Infrastructure Data for Smart Grid Development, Faculty of the Graduate School of the University of Texas at Arlington, 2014.