Secure Solar Forecasting: Deep Learning Approaches for Cyber Attacks Detection and Mitigation

Due to the increasing integration of solar energy into the energy infrastructure, solar power forecasting has become an attractive target for malicious attackers. However, existing studies in the literature primarily focus on detecting a single type of cyber attack, namely False Data Injection Attac...

Full description

Saved in:
Bibliographic Details
Published in2024 6th International Conference on Smart Power & Internet Energy Systems (SPIES) pp. 206 - 211
Main Authors Abughali, Ahmed, Alansari, Mohamad, Al-Sumaiti, Ameena S., El Moursi, Mohamed S.
Format Conference Proceeding
LanguageEnglish
Published IEEE 04.12.2024
Subjects
Online AccessGet full text
DOI10.1109/SPIES63782.2024.10983606

Cover

Abstract Due to the increasing integration of solar energy into the energy infrastructure, solar power forecasting has become an attractive target for malicious attackers. However, existing studies in the literature primarily focus on detecting a single type of cyber attack, namely False Data Injection Attacks (FDIAs), and they lack recovery approaches. This paper proposes two deep learning-based security schemes: a two-stage detection approach and a mitigation approach. The proposed schemes are designed to accurately detect and recover stealthy FDIAs and Denial of Service (DoS) attacks. The first stage in the detection model determines whether the sample has been attacked, while the second stage categorizes the type of attack if an attack is present. After identifying the attack type, the proposed mitigation model recovers the corrupted measurements. For comparative analysis, the performance of three different deep learning models is evaluated for both tasks: detection and mitigation. The proposed models are tested utilizing a real Global Horizontal Irradiance (GHI) dataset collected from Abu Dhabi between 2017 and 2019. The two-stage detection approach yielded significantly better results than tackling the problem directly as a multi-class classification task. Specifically, the best-performing two-stage detection model, the Long Short Term Memory (LSTM) model, showed an average improvement of 6.52% across the Area Under the Curve (AUC). Additionally, the best-performing proposed mitigation method, LSTM, substantially recovered the corrupted measurements by 92.53% for FDIAs and 99.62% for DoS attacks.
AbstractList Due to the increasing integration of solar energy into the energy infrastructure, solar power forecasting has become an attractive target for malicious attackers. However, existing studies in the literature primarily focus on detecting a single type of cyber attack, namely False Data Injection Attacks (FDIAs), and they lack recovery approaches. This paper proposes two deep learning-based security schemes: a two-stage detection approach and a mitigation approach. The proposed schemes are designed to accurately detect and recover stealthy FDIAs and Denial of Service (DoS) attacks. The first stage in the detection model determines whether the sample has been attacked, while the second stage categorizes the type of attack if an attack is present. After identifying the attack type, the proposed mitigation model recovers the corrupted measurements. For comparative analysis, the performance of three different deep learning models is evaluated for both tasks: detection and mitigation. The proposed models are tested utilizing a real Global Horizontal Irradiance (GHI) dataset collected from Abu Dhabi between 2017 and 2019. The two-stage detection approach yielded significantly better results than tackling the problem directly as a multi-class classification task. Specifically, the best-performing two-stage detection model, the Long Short Term Memory (LSTM) model, showed an average improvement of 6.52% across the Area Under the Curve (AUC). Additionally, the best-performing proposed mitigation method, LSTM, substantially recovered the corrupted measurements by 92.53% for FDIAs and 99.62% for DoS attacks.
Author Abughali, Ahmed
Alansari, Mohamad
Al-Sumaiti, Ameena S.
El Moursi, Mohamed S.
Author_xml – sequence: 1
  givenname: Ahmed
  surname: Abughali
  fullname: Abughali, Ahmed
  email: 100061920@ku.ac.ae
  organization: Khalifa University,Smart OR Lab,APEC, Electrical Engineering Department,Abu Dhabi,UAE
– sequence: 2
  givenname: Mohamad
  surname: Alansari
  fullname: Alansari, Mohamad
  email: 100061914@ku.ac.ae
  organization: Khalifa University,Computer Science Department,Abu Dhabi,UAE
– sequence: 3
  givenname: Ameena S.
  surname: Al-Sumaiti
  fullname: Al-Sumaiti, Ameena S.
  email: ameena.alsumaiti@ku.ac.ae
  organization: Khalifa University,Smart OR Lab,APEC, Electrical Engineering Department,Abu Dhabi,UAE
– sequence: 4
  givenname: Mohamed S.
  surname: El Moursi
  fullname: El Moursi, Mohamed S.
  email: mohamed.elmoursi@ku.ac.ae
  organization: Khalifa University,APEC, Electrical Engineering Department,Abu Dhabi,UAE
BookMark eNo1j01OwzAUhI0ECyi9AQtfIMF_cRx2UWlppSCQAktUvTjPxaLEkWMWvT1BwGrmG41GmityPoQBCaGc5Zyz6rZ93q1bLUsjcsGEyufMSM30GVlW5WwLJrUxWl2StxbtV0TahiNEugkRLUzJD4c7eo840gYhDjPSehxjAPuOE3Uh0tWpw0jrlMB-THM1oU0-DBSGnj765A_wg9fkwsFxwuWfLsjrZv2y2mbN08NuVTeZ56VJmamMkmUne6Z7YQG04bxwyiBWvSkZMuc6VKhVITSTvWXcSsE6B7aTVikmF-Tmd9cj4n6M_hPiaf__Wn4DyOpSyg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/SPIES63782.2024.10983606
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL) - NZ
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350368864
EndPage 211
ExternalDocumentID 10983606
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i178t-898437b3d06d2caa68115f48ee9d870e0ffbe4e6452603dc01c320bfacb3c4403
IEDL.DBID RIE
IngestDate Thu May 29 05:57:30 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i178t-898437b3d06d2caa68115f48ee9d870e0ffbe4e6452603dc01c320bfacb3c4403
PageCount 6
ParticipantIDs ieee_primary_10983606
PublicationCentury 2000
PublicationDate 2024-Dec.-4
PublicationDateYYYYMMDD 2024-12-04
PublicationDate_xml – month: 12
  year: 2024
  text: 2024-Dec.-4
  day: 04
PublicationDecade 2020
PublicationTitle 2024 6th International Conference on Smart Power & Internet Energy Systems (SPIES)
PublicationTitleAbbrev SPIES
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8961546
Snippet Due to the increasing integration of solar energy into the energy infrastructure, solar power forecasting has become an attractive target for malicious...
SourceID ieee
SourceType Publisher
StartPage 206
SubjectTerms Cyber Security
Cyberattack
Deep learning
Denial of Services (DoS)
False Data Injection Attack (FDIA)
Forecasting
Internet
Long short term memory
Noise
Noise measurement
Prevention and mitigation
Security
Solar energy
Title Secure Solar Forecasting: Deep Learning Approaches for Cyber Attacks Detection and Mitigation
URI https://ieeexplore.ieee.org/document/10983606
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5uJ08qTvxNDl5b2yQmjbcxHUPYGMzBLjKa5EWG0I2tPehfb5K2ioLgLYRASx7hey_5vu8hdGOFJZYwGjGjbcSIlpGrVWQkMm2BWaYS6wXO4wkfzdnT4m7RiNWDFgYAAvkMYj8Mb_lmrSt_VeZOuPSaA95BHSFkLdZq2TmJvJ1NXQbFqcM8V_cRFrfLfzROCbgxPECT9os1XeQtrkoV649fZoz__qVD1PuW6OHpF_gcoT0ojtFLuD0HPPP1KvZdN3W-87zme_wAsMGNmeor7jdO4rDDLmnFg3cFW9wvSy-4d0vLwM8qcF4YPF7VLhzroofmw8fnwShq-idEq1RkZZTJjFGhqEm4ITrPeebSP8syAGncMQUXBgUM_NMmT6jRSaopSZTNtaKasYSeoG6xLuAUYUvSnLrQcasd7HFXUucgDEkVUGlTk56hnt-b5aa2yFi223L-x_wF2vchCrwQdom65baCK4fupboOUf0EkIOmxw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA46D3pSceJvc_Da2iZZ2nob0zF1G4NtsIuMJnmRIbRj6w7615ukraIgeCuhpSGP8L2XfN_3ELrRkSaaMOoxJbXHiEw8U6skXhRLDUwzEWgrcB4MeW_KnmatWSVWd1oYAHDkM_Dto7vLV7nc2KMys8MTqzng22inZcqKqJRr1fycILkdj0wOxalBPVP5EebXH_xoneKQo7uPhvU_S8LIm78phC8_ftkx_ntSB6j5LdLDoy_4OURbkB2hF3d-DnhsK1Zs-27KdG2ZzXf4HmCJKzvVV9yuvMRhjU3aijvvAla4XRRWcm9eLRxDK8NppvBgUfpw5FkTTbsPk07PqzooeIswigsvTmJGI0FVwBWRacpjkwBqFgMkymxUMIEQwMBebvKAKhmEkpJA6FQKKhkL6DFqZHkGJwhrEqbUBI9raYCPm6I6hUiRUABNdKjCU9S0azNfliYZ83pZzv4Yv0a7vcmgP-8_Dp_P0Z4Nl2OJsAvUKFYbuDRYX4grF-FPgsSqGA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+6th+International+Conference+on+Smart+Power+%26+Internet+Energy+Systems+%28SPIES%29&rft.atitle=Secure+Solar+Forecasting%3A+Deep+Learning+Approaches+for+Cyber+Attacks+Detection+and+Mitigation&rft.au=Abughali%2C+Ahmed&rft.au=Alansari%2C+Mohamad&rft.au=Al-Sumaiti%2C+Ameena+S.&rft.au=El+Moursi%2C+Mohamed+S.&rft.date=2024-12-04&rft.pub=IEEE&rft.spage=206&rft.epage=211&rft_id=info:doi/10.1109%2FSPIES63782.2024.10983606&rft.externalDocID=10983606