Variational auto-encoder-based detection of electricity stealth cyber-attacks in AMI networks

Abdulrahman Takiddin, Muhammad Ismail, Usman Zafar, Erchin Serpedin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

16 Citations (Scopus)

Abstract

Current efforts to detect electricity theft cyber-attacks in advanced metering infrastructures (AMIs) are hindered by the lack of malicious electricity theft datasets. Therefore, anomaly detectors trained with the energy consumption profiles of honest customers appear as a plausible solution to overcome the lack of malicious datasets. Taking into account this constraint, this paper examines the performance of two structures of variational auto-encoders (VAEs); fully-connected (FC) VAE and long-short-term-memory (LSTM) VAE in detecting electricity thefts. The proposed structures are promising and exhibit an improvement of 11 - 15% in detection rate, 9 - 22% in false alarm rate, and 27 - 37% in the highest difference compared to existing state-of-the-art anomaly detectors that are shallow and static, such as single-class support vector machine (SVM) and auto-regressive integrated moving average (ARIMA) models.

Original languageEnglish
Title of host publication28th European Signal Processing Conference, EUSIPCO 2020 - Proceedings
PublisherEuropean Signal Processing Conference, EUSIPCO
Pages1590-1594
Number of pages5
ISBN (Electronic)9789082797053
DOIs
Publication statusPublished - 24 Jan 2021
Event28th European Signal Processing Conference, EUSIPCO 2020 - Amsterdam, Netherlands
Duration: 24 Aug 202028 Aug 2020

Publication series

NameEuropean Signal Processing Conference
Volume2021-January
ISSN (Print)2219-5491

Conference

Conference28th European Signal Processing Conference, EUSIPCO 2020
Country/TerritoryNetherlands
CityAmsterdam
Period24/08/2028/08/20

Keywords

  • Auto-encoders
  • Deep learning
  • Electricity theft

Fingerprint

Dive into the research topics of 'Variational auto-encoder-based detection of electricity stealth cyber-attacks in AMI networks'. Together they form a unique fingerprint.

Cite this