Deep Anomaly Detection Framework Utilizing Federated Learning for Electricity Theft Zero-Day Cyberattacks
<p>An illustration of our FL-based deep anomaly detection framework. (1) Initial global model distribution. (2) Local model training. (3) Local model parameters upload. (4) Local models’ parameters aggregation. (5) Distribution of the updated global model.</p> "> Figure 2
<p>Visualization of a benign electricity usage sample and the corresponding malicious samples.</p> "> Figure 3
<p>The architecture of a fully connected feedforward autoencoder (FC-AE).</p> "> Figure 4
<p>Comparison of the ROC curves of different anomaly electricity theft detectors.</p> "> Figure 5
<p>Comparison of the PR curves of different anomaly electricity theft detectors.</p> "> Figure 6
<p>Comparison of the ROC curves of CL- and FL-based anomaly electricity theft detectors.</p> "> Figure 7
<p>Comparison of the PR curves of CL- and FL-based anomaly electricity theft detectors.</p> ">
Abstract
:1. Introduction
- We investigate the performance of various DL-supervised electricity theft detectors, including the feedforward fully connected neural network (FCNN), convolutional neural network (CNN), and long short-term memory (LSTM) recurrent neural network (RNN), against electricity theft zero-day attacks. Our experimental results demonstrate that while supervised detectors are successful against known attacks, they fail to detect novel unknown attacks.
- We investigate the performance of various anomaly detection models, including Isolation Forest (IF), One-Class Support Vector Machine (OCSVM), and Autoencoder, against electricity theft zero-day attacks. Our experimental results indicate that the autoencoder-based detector outperforms the IF- and OCSVM-based detectors. Moreover, our results demonstrate a significant improvement in the anomaly detectors’ performance compared to the supervised detectors in defending against electricity theft zero-day attacks.
- We propose a comprehensive FL-based deep anomaly detection framework tailored for practical, reliable, and privacy-preserving energy theft detection. In our framework, an EUC aggregation server initializes the parameters of a fully connected feedforward autoencoder (FC-AE)-based anomaly detector and distributes it to selected consumers to participate in FL. In each FL round, participating consumers train copies of the anomaly detector locally based on their historical electricity consumption readings and only share their local detectors’ parameters with the aggregation server to update the global detector by averaging the local detectors’ parameters. Our experimental results demonstrate the capability of our proposed FL-based anomaly detector to accurately detect unknown (zero-day) attacks of electricity theft while protecting consumers’ privacy.
2. System and Threat Models
2.1. System Model
- Step 1: The EUC aggregation server initializes the global anomaly detector parameters and distributes them to the participating consumers.
- Step 2: The consumers train the copies of the global detector locally using their private and sensitive data.
- Step 3: After training, the consumers upload their local detectors to the EUC aggregation server for aggregation.
- Step 4: The aggregation server averages the received local detectors’ parameters to update the global detector parameters.
- Step 5: The new global detector is distributed back to the consumers for the next FL training iteration.
- Training Data Requirements: Due to privacy concerns, it is more practical for EUCs to use FL than to ask consumers to share their private data. Due to the unavailability of real malicious data and the requirement to detect zero-day attacks, it is more practical for EUCs to train anomaly detectors than supervised detectors trained only on specific attack scenarios.
- Infrastructure Requirements: Our framework’s infrastructure requirements are based on the current smart grids’ advanced metering infrastructure (AMI) comprising SMs installed at consumers’ premises, data centers, and communication networks connecting the consumers’ side to the EUC side. Thus, our proposed framework is practical, as it does not require EUCs to implement costly and drastic changes to their infrastructure.
- Computational Costs: The computational costs of our framework are very reasonable. On the consumers’ side, all that is required from a participating consumer in the FL process is to train a local model on their small private data. This cheap process takes a few minutes on a device with modest computational resources. On the EUC side, all that is required is to implement an aggregation process to update the parameters of the global detector. This is a very simple task given the EUC’s high computational capabilities.
- Communication Costs: Our framework is communication-efficient. Unlike traditional methods that require consumers to upload their private data to the EUC, thus consuming AMI communication resources, our framework only requires consumers to upload their trained model parameters.
- Scalability Considerations: Considering factors such as performance, flexibility, cost, and complexity, our framework demonstrates excellent scalability. The number of consumers will not adversely affect any of these factors. Our framework does not necessitate all smart grid consumers to participate in the FL process or is designed to function only if a specific number of consumers is met. Particularly, consumers may be clustered into representative groups based on factors including geographical location, home size, number of inhabitants, and cost of living, and a few consumers from each group are selected to participate in the FL process [12,15].
2.2. Adversary Model
3. Proposed Framework
3.1. Rationale behind the Design
3.2. Autoencoders
3.2.1. An Overview
3.2.2. Fully Connected Feedforward Autoencoder (FC-AE)
3.3. Federated Learning (FL)
Algorithm 1: Training of the FC-AE using FL. |
4. Performance Evaluation
4.1. Dataset
4.2. Metrics
- Accuracy (ACC): It is the proportion of correctly identified samples among the total classified samples. Its value is derived from the following equation:
- Precision (PR): It gives the proportion of true electricity theft samples to the tally of samples identified by the detector as theft. Its value is derived as follows:
- Detection Rate (DR): It is the proportion of the correctly identified electricity theft samples among all the tested malicious samples. Its value is derived as follows:
- False Alarm (FA): It is the proportion of misidentified benign samples as electricity theft among all the tested benign samples. Its value is derived as follows:
- Highest Difference (HD): It is simply the subtraction of from . Its value is derived as follows:
- False Negative Rate (FNR): It is the proportion of the misidentified electricity theft samples as benign among all the tested malicious samples. Its value is derived as follows:
- F1 score (F1). It represents the harmonic mean of and . Its value is derived as follows:
- Receiver Operating Characteristic (ROC) Curve: It graphically illustrates the connection between the and rates across various classification thresholds.
- Precision–Recall (P–R) Curve. It graphically illustrates the connection between and recall across various classification thresholds.
4.3. Experiments
4.3.1. Experiment 1
4.3.2. Experiment 2
- Randomly dividing the test benign samples from each consumer into six parts.
- Using attacks 1 through 6 to generate corresponding malicious samples for each part.
- Combining the benign and malicious samples.
- The test samples from all consumers constitute the final test set.
5. Related Works and Limitations
5.1. Supervised Detection Approaches
FL Works
5.2. Anomaly Detection Approaches
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Goudarzi, A.; Ghayoor, F.; Waseem, M.; Fahad, S.; Traore, I. A Survey on IoT-Enabled Smart Grids: Emerging, Applications, Challenges, and Outlook. Energies 2022, 15, 6984. [Google Scholar] [CrossRef]
- Yassine, A.; Baza, M.; Abdelfattah, S.; Badr, M.; Rasheed, A.; Amer, R. Recent Advances Towards Securing Smart Grids with Blockchain. In Proceedings of the International Telecommunications Conference (ITC-Egypt), Alexandria, Egypt, 18–20 July 2023; pp. 101–106. [Google Scholar]
- Ibrahem, M.I.; Badr, M.M.; Fouda, M.M.; Mahmoud, M.; Alasmary, W.; Fadlullah, Z.M. PMBFE: Efficient and Privacy-Preserving Monitoring and Billing Using Functional Encryption for AMI Networks. In Proceedings of the 2020 International Symposium on Networks, Computers and Communications (ISNCC), Montreal, QC, Canada, 20–22 October 2020. [Google Scholar]
- Lepolesa, L.J.; Achari, S.; Cheng, L. Electricity theft detection in smart grids based on deep neural network. IEEE Access 2022, 10, 39638–39655. [Google Scholar] [CrossRef]
- Badr, M.M.; Ibrahem, M.I.; Baza, M.; Mahmoud, M.; Alasmary, W. Detecting Electricity Fraud in the Net-Metering System Using Deep Learning. In Proceedings of the 2021 International Symposium on Networks, Computers and Communications (ISNCC), Dubai, United Arab Emirates, 22–25 October 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Badr, M.M.; Ibrahem, M.I.; Mahmoud, M.; Fouda, M.M.; Alsolami, F.; Alasmary, W. Detection of false-reading attacks in smart grid net-metering system. IEEE Internet Things J. 2021, 9, 1386–1401. [Google Scholar] [CrossRef]
- Li, Y.; Wei, X.; Li, Y.; Dong, Z.; Shahidehpour, M. Detection of false data injection attacks in smart grid: A secure federated deep learning approach. IEEE Trans. Smart Grid 2022, 13, 4862–4872. [Google Scholar] [CrossRef]
- Yan, Z.; Wen, H. Performance Analysis of Electricity Theft Detection for the Smart Grid: An Overview. IEEE Trans. Instrum. Meas. 2021, 71, 2502928. [Google Scholar] [CrossRef]
- Yao, D.; Wen, M.; Liang, X.; Fu, Z.; Zhang, K.; Yang, B. Energy theft detection with energy privacy preservation in the smart grid. IEEE Internet Things J. 2019, 6, 7659–7669. [Google Scholar] [CrossRef]
- Ahir, R.K.; Chakraborty, B. Pattern-based and context-aware electricity theft detection in smart grid. Sustain. Energy Grids Netw. 2022, 32, 100833. [Google Scholar] [CrossRef]
- El-Toukhy, A.T.; Badr, M.M.; Mahmoud, M.M.E.A.; Srivastava, G.; Fouda, M.M.; Alsabaan, M. Electricity Theft Detection Using Deep Reinforcement Learning in Smart Power Grids. IEEE Access 2023, 11, 59558–59574. [Google Scholar] [CrossRef]
- Badr, M.M.; Mahmoud, M.M.E.A.; Abdulaal, M.; Aljohani, A.J.; Alsolami, F.; Balamsh, A. A Novel Evasion Attack Against Global Electricity Theft Detectors and a Countermeasure. IEEE Internet Things J. 2023, 10, 11038–11053. [Google Scholar] [CrossRef]
- Bondok, A.H.; Mahmoud, M.; Badr, M.M.; Fouda, M.M.; Abdallah, M.; Alsabaan, M. Novel Evasion Attacks against Adversarial Training Defense for Smart Grid Federated Learning. IEEE Access 2023, 11, 112953–112972. [Google Scholar] [CrossRef]
- Elgarhy, I.; El-toukhy, A.; Badr, M.; Mahmoud, M.; Fouda, M.; Alsabaan, M.; Kholidy, H.A. Secured Cluster-Based Electricity Theft Detectors Against Blackbox Evasion Attacks. In Proceedings of the IEEE 21st Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 6–9 January 2024. [Google Scholar]
- Elgarhy, I.; Badr, M.M.; Mahmoud, M.M.E.A.; Fouda, M.M.; Alsabaan, M.; Kholidy, H.A. Clustering and Ensemble Based Approach for Securing Electricity Theft Detectors Against Evasion Attacks. IEEE Access 2023, 11, 112147–112164. [Google Scholar] [CrossRef]
- Xia, X.; Lin, J.; Jia, Q.; Wang, X.; Ma, C.; Cui, J.; Liang, W. ETD-ConvLSTM: A deep learning approach for electricity theft detection in smart grids. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2553–2568. [Google Scholar] [CrossRef]
- Wen, M.; Xie, R.; Lu, K.; Wang, L.; Zhang, K. FedDetect: A Novel Privacy-Preserving Federated Learning Framework for Energy Theft Detection in Smart Grid. IEEE Internet Things J. 2021, 9, 6069–6080. [Google Scholar] [CrossRef]
- Ahmad, T.; Chen, H.; Wang, J.; Guo, Y. Review of various modeling techniques for the detection of electricity theft in smart grid environment. Renew. Sustain. Energy Rev. 2018, 82, 2916–2933. [Google Scholar] [CrossRef]
- Badr, M.M. Security and Privacy Preservation for Smart Grid AMI Using Machine Learning and Cryptography. Ph.D. Dissertation, Tennessee Technological University, Cookeville, TN, USA, 2022. [Google Scholar]
- Badr, M.M.; Ibrahem, M.I.; Kholidy, H.A.; Fouda, M.M.; Ismail, M. Review of the Data-Driven Methods for Electricity Fraud Detection in Smart Metering Systems. Energies 2023, 16, 2852. [Google Scholar] [CrossRef]
- Hudson, N.; Hossain, M.J.; Hosseinzadeh, M.; Khamfroush, H.; Rahnamay-Naeini, M.; Ghani, N. A framework for edge intelligent smart distribution grids via federated learning. In Proceedings of the 2021 International Conference on Computer Communications and Networks (ICCCN), Athens, Greece, 19–22 July 2021; pp. 1–9. [Google Scholar]
- Jithish, J.; Alangot, B.; Mahalingam, N.; Yeo, K.S. Distributed Anomaly Detection in Smart Grids: A Federated Learning-Based Approach. IEEE Access 2023, 11, 7157–7179. [Google Scholar] [CrossRef]
- Ibrahem, M.I.; Badr, M.M.; Mahmoud, M.; Fouda, M.M.; Alasmary, W. Countering Presence Privacy Attack in Efficient AMI Networks Using Interactive Deep-Learning. In Proceedings of the 2021 International Symposium on Networks, Computers and Communications (ISNCC), Dubai, United Arab Emirates, 31 October–2 November 2021. [Google Scholar]
- Badr, M.M.; Ibrahem, M.I.; Mahmoud, M.; Alasmary, W.; Fouda, M.M.; Almotairi, K.H.; Fadlullah, Z.M. Privacy-Preserving Federated-Learning-Based Net-Energy Forecasting. In Proceedings of the SoutheastCon 2022, Mobile, AL, USA, 31 March–3 April 2022; pp. 133–139. [Google Scholar]
- Qi, J.; Lin, F.; Chen, Z.; Tang, C.; Jia, R.; Li, M. High-quality model aggregation for blockchain-based federated learning via reputation-motivated task participation. IEEE Internet Things J. 2022, 9, 18378–18391. [Google Scholar] [CrossRef]
- Badr, M.M.; Mahmoud, M.M.E.A.; Fang, Y.; Abdulaal, M.; Aljohani, A.J.; Alasmary, W.; Ibrahem, M.I. Privacy-Preserving and Communication-Efficient Energy Prediction Scheme Based on Federated Learning for Smart Grids. IEEE Internet Things J. 2023, 10, 7719–7736. [Google Scholar] [CrossRef]
- Su, Z.; Wang, Y.; Luan, T.H.; Zhang, N.; Li, F.; Chen, T.; Cao, H. Secure and efficient federated learning for smart grid with edge-cloud collaboration. IEEE Trans. Ind. Inform. 2021, 18, 1333–1344. [Google Scholar] [CrossRef]
- Singh, P.; Masud, M.; Hossain, M.S.; Kaur, A.; Muhammad, G.; Ghoneim, A. Privacy-preserving serverless computing using federated learning for smart grids. IEEE Trans. Ind. Inform. 2021, 18, 7843–7852. [Google Scholar] [CrossRef]
- Bondok, A.H.; Mahmoud, M.; Badr, M.M.; Fouda, M.M.; Alsabaan, M. A Distillation-Based Attack Against Adversarial Training Defense for Smart Grid Federated Learning. In Proceedings of the IEEE 21st Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 6–9 January 2024; pp. 963–968. [Google Scholar]
- Jokar, P.; Arianpoo, N.; Leung, V.C. Electricity theft detection in AMI using customers’ consumption patterns. IEEE Trans. Smart Grid 2015, 7, 216–226. [Google Scholar] [CrossRef]
- Zhang, G.; Liu, Y.; Jin, X. A survey of autoencoder-based recommender systems. Front. Comput. Sci. 2020, 14, 430–450. [Google Scholar] [CrossRef]
- Takiddin, A.; Ismail, M.; Zafar, U.; Serpedin, E. Deep Autoencoder-Based Anomaly Detection of Electricity Theft Cyberattacks in Smart Grids. IEEE Syst. J. 2022, 16, 4106–4117. [Google Scholar] [CrossRef]
- Miller, M.; Habbak, H.; Badr, M.; Baza, M.; Mahmoud, M.; Fouda, M. Electricity Theft Detection Approach Using One-Class Classification for AMI. In Proceedings of the IEEE 21st Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 6–9 January 2024; pp. 260–265. [Google Scholar]
- Goodfellow, I.; Bengio, Y.; Courville, A. “Deep Learning”; MIT Press: Cambridge, MA, USA, 2016. [Google Scholar]
- Dataset. Smart Metering Project—Electricity Customer Behaviour Trial, 1st ed.; Irish Social Science Data Archive; Commission for Energy Regulation (CER): Dublin, Ireland, 2012.
- Nagi, J.; Yap, K.S.; Tiong, S.K.; Ahmed, S.K.; Nagi, F. Improving SVM-Based Nontechnical Loss Detection in Power Utility Using the Fuzzy Inference System. IEEE Trans. Power Deliv. 2011, 26, 1284–1285. [Google Scholar] [CrossRef]
- Li, S.; Han, Y.; Yao, X.; Yingchen, S.; Wang, J.; Zhao, Q. Electricity theft detection in power grids with deep learning and random forests. J. Electr. Comput. Eng. 2019, 2019, 4136874. [Google Scholar] [CrossRef]
- Dash, S.K.; Roccotelli, M.; Khansama, R.R.; Fanti, M.P.; Mangini, A.M. Long Term Household Electricity Demand Forecasting Based on RNN-GBRT Model and a Novel Energy Theft Detection Method. Appl. Sci. 2021, 11, 8612. [Google Scholar] [CrossRef]
- Huang, H.; Liu, S.; Davis, K. Energy theft detection via artificial neural networks. In Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), Sarajevo, Bosnia and Herzegovina, 21–25 October 2018; pp. 1–6. [Google Scholar]
- Ullah, A.; Javaid, N.; Samuel, O.; Imran, M.; Shoaib, M. CNN and GRU based deep neural network for electricity theft detection to secure smart grid. In Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 1598–1602. [Google Scholar]
- Hoenkamp, R.; Huitema, G.B.; de Moor-van Vugt, A.J. The neglected consumer: The case of the smart meter rollout in the Netherlands. Renew. Energy Law Policy Rev. 2011, 2, 269–282. [Google Scholar] [CrossRef]
- Ibrahem, M.I.; Mahmoud, M.; Fouda, M.M.; ElHalawany, B.M.; Alasmary, W. Privacy-preserving and Efficient Decentralized Federated Learning-based Energy Theft Detector. In Proceedings of the GLOBECOM 2022—2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 4–8 December 2022; pp. 287–292. [Google Scholar]
- Ashraf, M.M.; Waqas, M.; Abbas, G.; Baker, T.; Abbas, Z.H.; Alasmary, H. Feddp: A privacy-protecting theft detection scheme in smart grids using federated learning. Energies 2022, 15, 6241. [Google Scholar] [CrossRef]
- Wang, X.; Xie, H.; Tang, L.; Chen, C.; Bie, Z. Decentralized Privacy-Preserving Electricity Theft Detection for Distribution System Operators. IEEE Trans. Smart Grid 2023, 15, 2179–2190. [Google Scholar] [CrossRef]
- Singh, S.K.; Bose, R.; Joshi, A. PCA based electricity theft detection in advanced metering infrastructure. In Proceedings of the 2017 7th International Conference on Power Systems (ICPS), Pune, India, 21–23 December 2017; pp. 441–445. [Google Scholar]
- Badrinath Krishna, V.; Iyer, R.K.; Sanders, W.H. ARIMA-based modeling and validation of consumption readings in power grids. In Proceedings of the International Conference on Critical Information Infrastructures Security, Munich, Germany, 14–16 September 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 199–210. [Google Scholar]
- Krishna, V.B.; Gunter, C.A.; Sanders, W.H. Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and DER Fraud. IEEE J. Sel. Top. Signal Process. 2018, 12, 790–805. [Google Scholar] [CrossRef]
- Habbak, H.; Mahmoud, M.; Fouda, M.M.; Alsabaan, M.; Mattar, A.; Salama, G.I.; Metwally, K. Efficient One-Class False Data Detector Based on Deep SVDD for Smart Grids. Energies 2023, 16, 7069. [Google Scholar] [CrossRef]
Number | Formulation |
---|---|
Attack 1 | |
Attack 2 | |
Attack 3 | |
Attack 4 | |
Attack 5 | |
Attack 6 |
Approach | Architecture | Metrics | ||||
---|---|---|---|---|---|---|
ACC | DR | HD | FNR | F1 | ||
Supervised | CNN | 60.73 | 26.83 | 21.47 | 73.16 | 40.59 |
LSTM | 62.55 | 28.31 | 25.11 | 71.68 | 43.06 | |
FCNN | 65.07 | 36.78 | 30.14 | 63.22 | 51.29 | |
Anomaly | IF | 76.43 | 75.81 | 52.96 | 24.18 | 77.48 |
OCSVM | 83.87 | 84.38 | 67.67 | 15.61 | 84.84 | |
FC-AE | 86.80 | 88.70 | 74.07 | 11.29 | 85.28 |
Architecture | Metrics | ||||||
---|---|---|---|---|---|---|---|
ACC | PR | DR | FA | HD | FNR | F1 | |
Centralized | 86.80 | 82.11 | 88.70 | 14.62 | 74.07 | 11.29 | 85.28 |
Federated | 84.17 | 80.01 | 85.51 | 16.86 | 68.65 | 14.48 | 82.48 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alshehri, A.; Badr, M.M.; Baza, M.; Alshahrani, H. Deep Anomaly Detection Framework Utilizing Federated Learning for Electricity Theft Zero-Day Cyberattacks. Sensors 2024, 24, 3236. https://doi.org/10.3390/s24103236
Alshehri A, Badr MM, Baza M, Alshahrani H. Deep Anomaly Detection Framework Utilizing Federated Learning for Electricity Theft Zero-Day Cyberattacks. Sensors. 2024; 24(10):3236. https://doi.org/10.3390/s24103236
Chicago/Turabian StyleAlshehri, Ali, Mahmoud M. Badr, Mohamed Baza, and Hani Alshahrani. 2024. "Deep Anomaly Detection Framework Utilizing Federated Learning for Electricity Theft Zero-Day Cyberattacks" Sensors 24, no. 10: 3236. https://doi.org/10.3390/s24103236