Secure Solar Forecasting: Deep Learning Approaches for Cyber Attacks Detection and Mitigation
Due to the increasing integration of solar energy into the energy infrastructure, solar power forecasting has become an attractive target for malicious attackers. However, existing studies in the literature primarily focus on detecting a single type of cyber attack, namely False Data Injection Attac...
Saved in:
Published in | 2024 6th International Conference on Smart Power & Internet Energy Systems (SPIES) pp. 206 - 211 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
04.12.2024
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/SPIES63782.2024.10983606 |
Cover
Abstract | Due to the increasing integration of solar energy into the energy infrastructure, solar power forecasting has become an attractive target for malicious attackers. However, existing studies in the literature primarily focus on detecting a single type of cyber attack, namely False Data Injection Attacks (FDIAs), and they lack recovery approaches. This paper proposes two deep learning-based security schemes: a two-stage detection approach and a mitigation approach. The proposed schemes are designed to accurately detect and recover stealthy FDIAs and Denial of Service (DoS) attacks. The first stage in the detection model determines whether the sample has been attacked, while the second stage categorizes the type of attack if an attack is present. After identifying the attack type, the proposed mitigation model recovers the corrupted measurements. For comparative analysis, the performance of three different deep learning models is evaluated for both tasks: detection and mitigation. The proposed models are tested utilizing a real Global Horizontal Irradiance (GHI) dataset collected from Abu Dhabi between 2017 and 2019. The two-stage detection approach yielded significantly better results than tackling the problem directly as a multi-class classification task. Specifically, the best-performing two-stage detection model, the Long Short Term Memory (LSTM) model, showed an average improvement of 6.52% across the Area Under the Curve (AUC). Additionally, the best-performing proposed mitigation method, LSTM, substantially recovered the corrupted measurements by 92.53% for FDIAs and 99.62% for DoS attacks. |
---|---|
AbstractList | Due to the increasing integration of solar energy into the energy infrastructure, solar power forecasting has become an attractive target for malicious attackers. However, existing studies in the literature primarily focus on detecting a single type of cyber attack, namely False Data Injection Attacks (FDIAs), and they lack recovery approaches. This paper proposes two deep learning-based security schemes: a two-stage detection approach and a mitigation approach. The proposed schemes are designed to accurately detect and recover stealthy FDIAs and Denial of Service (DoS) attacks. The first stage in the detection model determines whether the sample has been attacked, while the second stage categorizes the type of attack if an attack is present. After identifying the attack type, the proposed mitigation model recovers the corrupted measurements. For comparative analysis, the performance of three different deep learning models is evaluated for both tasks: detection and mitigation. The proposed models are tested utilizing a real Global Horizontal Irradiance (GHI) dataset collected from Abu Dhabi between 2017 and 2019. The two-stage detection approach yielded significantly better results than tackling the problem directly as a multi-class classification task. Specifically, the best-performing two-stage detection model, the Long Short Term Memory (LSTM) model, showed an average improvement of 6.52% across the Area Under the Curve (AUC). Additionally, the best-performing proposed mitigation method, LSTM, substantially recovered the corrupted measurements by 92.53% for FDIAs and 99.62% for DoS attacks. |
Author | Abughali, Ahmed Alansari, Mohamad Al-Sumaiti, Ameena S. El Moursi, Mohamed S. |
Author_xml | – sequence: 1 givenname: Ahmed surname: Abughali fullname: Abughali, Ahmed email: 100061920@ku.ac.ae organization: Khalifa University,Smart OR Lab,APEC, Electrical Engineering Department,Abu Dhabi,UAE – sequence: 2 givenname: Mohamad surname: Alansari fullname: Alansari, Mohamad email: 100061914@ku.ac.ae organization: Khalifa University,Computer Science Department,Abu Dhabi,UAE – sequence: 3 givenname: Ameena S. surname: Al-Sumaiti fullname: Al-Sumaiti, Ameena S. email: ameena.alsumaiti@ku.ac.ae organization: Khalifa University,Smart OR Lab,APEC, Electrical Engineering Department,Abu Dhabi,UAE – sequence: 4 givenname: Mohamed S. surname: El Moursi fullname: El Moursi, Mohamed S. email: mohamed.elmoursi@ku.ac.ae organization: Khalifa University,APEC, Electrical Engineering Department,Abu Dhabi,UAE |
BookMark | eNo1j01OwzAUhI0ECyi9AQtfIMF_cRx2UWlppSCQAktUvTjPxaLEkWMWvT1BwGrmG41GmityPoQBCaGc5Zyz6rZ93q1bLUsjcsGEyufMSM30GVlW5WwLJrUxWl2StxbtV0TahiNEugkRLUzJD4c7eo840gYhDjPSehxjAPuOE3Uh0tWpw0jrlMB-THM1oU0-DBSGnj765A_wg9fkwsFxwuWfLsjrZv2y2mbN08NuVTeZ56VJmamMkmUne6Z7YQG04bxwyiBWvSkZMuc6VKhVITSTvWXcSsE6B7aTVikmF-Tmd9cj4n6M_hPiaf__Wn4DyOpSyg |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/SPIES63782.2024.10983606 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) - NZ IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9798350368864 |
EndPage | 211 |
ExternalDocumentID | 10983606 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i178t-898437b3d06d2caa68115f48ee9d870e0ffbe4e6452603dc01c320bfacb3c4403 |
IEDL.DBID | RIE |
IngestDate | Thu May 29 05:57:30 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i178t-898437b3d06d2caa68115f48ee9d870e0ffbe4e6452603dc01c320bfacb3c4403 |
PageCount | 6 |
ParticipantIDs | ieee_primary_10983606 |
PublicationCentury | 2000 |
PublicationDate | 2024-Dec.-4 |
PublicationDateYYYYMMDD | 2024-12-04 |
PublicationDate_xml | – month: 12 year: 2024 text: 2024-Dec.-4 day: 04 |
PublicationDecade | 2020 |
PublicationTitle | 2024 6th International Conference on Smart Power & Internet Energy Systems (SPIES) |
PublicationTitleAbbrev | SPIES |
PublicationYear | 2024 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.8961546 |
Snippet | Due to the increasing integration of solar energy into the energy infrastructure, solar power forecasting has become an attractive target for malicious... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 206 |
SubjectTerms | Cyber Security Cyberattack Deep learning Denial of Services (DoS) False Data Injection Attack (FDIA) Forecasting Internet Long short term memory Noise Noise measurement Prevention and mitigation Security Solar energy |
Title | Secure Solar Forecasting: Deep Learning Approaches for Cyber Attacks Detection and Mitigation |
URI | https://ieeexplore.ieee.org/document/10983606 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5uJ08qTvxNDl5b2yQmjbcxHUPYGMzBLjKa5EWG0I2tPehfb5K2ioLgLYRASx7hey_5vu8hdGOFJZYwGjGjbcSIlpGrVWQkMm2BWaYS6wXO4wkfzdnT4m7RiNWDFgYAAvkMYj8Mb_lmrSt_VeZOuPSaA95BHSFkLdZq2TmJvJ1NXQbFqcM8V_cRFrfLfzROCbgxPECT9os1XeQtrkoV649fZoz__qVD1PuW6OHpF_gcoT0ojtFLuD0HPPP1KvZdN3W-87zme_wAsMGNmeor7jdO4rDDLmnFg3cFW9wvSy-4d0vLwM8qcF4YPF7VLhzroofmw8fnwShq-idEq1RkZZTJjFGhqEm4ITrPeebSP8syAGncMQUXBgUM_NMmT6jRSaopSZTNtaKasYSeoG6xLuAUYUvSnLrQcasd7HFXUucgDEkVUGlTk56hnt-b5aa2yFi223L-x_wF2vchCrwQdom65baCK4fupboOUf0EkIOmxw |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA46D3pSceJvc_Da2iZZ2nob0zF1G4NtsIuMJnmRIbRj6w7615ukraIgeCuhpSGP8L2XfN_3ELrRkSaaMOoxJbXHiEw8U6skXhRLDUwzEWgrcB4MeW_KnmatWSVWd1oYAHDkM_Dto7vLV7nc2KMys8MTqzng22inZcqKqJRr1fycILkdj0wOxalBPVP5EebXH_xoneKQo7uPhvU_S8LIm78phC8_ftkx_ntSB6j5LdLDoy_4OURbkB2hF3d-DnhsK1Zs-27KdG2ZzXf4HmCJKzvVV9yuvMRhjU3aijvvAla4XRRWcm9eLRxDK8NppvBgUfpw5FkTTbsPk07PqzooeIswigsvTmJGI0FVwBWRacpjkwBqFgMkymxUMIEQwMBebvKAKhmEkpJA6FQKKhkL6DFqZHkGJwhrEqbUBI9raYCPm6I6hUiRUABNdKjCU9S0azNfliYZ83pZzv4Yv0a7vcmgP-8_Dp_P0Z4Nl2OJsAvUKFYbuDRYX4grF-FPgsSqGA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+6th+International+Conference+on+Smart+Power+%26+Internet+Energy+Systems+%28SPIES%29&rft.atitle=Secure+Solar+Forecasting%3A+Deep+Learning+Approaches+for+Cyber+Attacks+Detection+and+Mitigation&rft.au=Abughali%2C+Ahmed&rft.au=Alansari%2C+Mohamad&rft.au=Al-Sumaiti%2C+Ameena+S.&rft.au=El+Moursi%2C+Mohamed+S.&rft.date=2024-12-04&rft.pub=IEEE&rft.spage=206&rft.epage=211&rft_id=info:doi/10.1109%2FSPIES63782.2024.10983606&rft.externalDocID=10983606 |