Next Article in Journal
A New Class of Irregular Packing Problems Reducible to Sphere Packing in Arbitrary Norms
Previous Article in Journal
Optimal Social and Vaccination Control in the SVIR Epidemic Model
Previous Article in Special Issue
Preface to the Special Issue on Probability and Stochastic Processes with Applications to Communications, Systems and Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Correction

Correction: Almalaq et al. Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems. Mathematics 2022, 10, 2574

by
Abdulaziz Almalaq
1,*,
Saleh Albadran
1 and
Mohamed A. Mohamed
2,*
1
Department of Electrical Engineering, Engineering College, University of Ha’il, Ha’il 55476, Saudi Arabia
2
Electrical Engineering Department, Faculty of Engineering, Minia University, Minia 61519, Egypt
*
Authors to whom correspondence should be addressed.
Submission received: 11 September 2023 / Accepted: 12 January 2024 / Published: 22 March 2024
The authors wish to make the following corrections to this paper [1]:
1—The Abstract should be modified to be as follows, “In this study, a deep learning-based attack detection model is proposed to address the problem of system disturbances in energy systems caused by natural events like storms and tornadoes or human-made events such as cyber-attacks. The proposed model is trained using the long time recorded data through accurate phasor measurement units (PMUs). The data is then sent to various machine learning methods based on the effective features extracted out using advanced principal component analysis (PCA) model. The performance of the proposed model is examined and compared with some other benchmarks using various indices such as confusion matrix. The results show that incorporating PCA as the feature selection model could effectively decrease feature redundancy and learning time while minimizing data information loss. Furthermore, the proposed model investigates the potential of deep learning-based and Decision Tree (DT) classifiers to detect cyber-attacks for improving the security and efficiency of modern intelligent energy grids. By utilizing the big data recorded by PMUs and identifying relevant properties or characteristics using PCA, the proposed deep model can effectively detect attacks or disturbances in the system, allowing operators to take appropriate action and prevent any further damage”.
2—The keywords should be, “cyber-attack detection; deep machine learning; decision tree; principle component analysis; smart power grid; data processing”.
3—In the Introduction, Section 1.1, Necessity of the Research, due to changing the order or References should be modified as follows: Critical infrastructures rely on complex systems that incorporate both cyber and physical components in their daily operations. The backbone of these facilities is the Industrial Control System (ICS), which plays a crucial role in monitoring and controlling critical infrastructures such as smart power grids, oil and gas, aerospace, and transportation. Accordingly, the safety and security of ICSs are essential for national security [1,2].
The Internet of Things (IoT) integration in ICS has created opportunities for cybercriminals to exploit system vulnerabilities and launch cyber-attacks. The Stuxnet attackin 2010, which targeted ICSs, raised awareness of cyber-security vulnerabilities in these systems. Stuxnet aimed to disrupt the system’s operation without affecting Information Technology (IT) systems [3]. In 2015, the Black-Energy cyber-attack targeted Ukraine’s power grids, resulting in a massive power outage that affected thousands of people [2,4]. While some attacks may cause information leakage, others can damage the physical system or misrepresent the system state for monitoring engineers. These examples high light the growing cyber-threat to operational technology, which supports much of the enabling computer technologies that critical infrastructure ICSs rely on [2].
Technically, power distribution systems and waste-water treatment plants are among the areas where Cyber-physical systems (CPS) is being used. Nevertheless, CPS security problems differ from conventional cyber-security problems in that they include integrity, confidentiality, and availability. In addition to transmitting, distributing, monitoring, and controlling electricity, a smart grid (SG) would greatly enhance energy effectiveness and reliability. Such systems may fail and result in temporary damage to infrastructures [5]. Power grids are regarded as essential infrastructure nowadays by many societies, which have developed security measures and policies related to them [6]. Phasor measurement units (PMUs) are adopted in modern electrical systems to improve reliability as they become more complex in their structure and design. Utilizing the gathered information for quick decision making is one of the advantages. There is still the possibility that hacker exploits vulnerabilities to result in branch overloaded tripping, which will lead to cascading failures and, therefore, leads to considerable damage to SG systems [7]. As the operators monitor and manage the energy grid, they must consider possible attacks on the grid. To accomplish this, much energy and grid expertise is required. However, deep machine learning (DML) methods are used because of their capability to recognize patterns and learn, as well as being quickly able to identify potential security boundaries [8].
4—In the contribution section (Section 1.3), Ref. [17] should be [20], also (1), (2), (3) should be updated to:
(1)
A new classification model based on the Decision Tree (DT) and auto-encoder technique has been proposed as a binary classifier to detect attacks with the aim of increasing the detection accuracy and decreasing the false positive index.
(2)
A Principal Component Analysis (PCA) applied to the raw data of PMUs as an effective feature selection model reduces feature redundancy and learning time while minimizing the loss of data information. This approach has been shown to be effective in various evaluations as it significantly improves the performance of models.
(3)
A new process for handling abnormal data, such as non-numbers and infinity values in data sets, is proposed. This approach could significantly enhance accuracy in comparison to the conventional processes of processing abnormal data.
5—In Section 2.1, “Introduction to Power System Framework Configuration”, Refs. “[18–20]” should be “[21–23]”. Ref. [21] after Figure 1 should be removed.
6—The section (Section 2.1, paragraph 2) “This experiment applied a data set that contains 128 features recorded using PMUs 1 to 4 and relay snort alarms and logs (Relay and PMU have been combined). A synchronous phasor, or PMU, measures electric waves on a power network using a common time source. A total of 29 features could be measured by every PMU. The data set also contains 12 columns of log data from the control panel and one column of an actual tag. There are three main categories of scenarios in the multiclass classification data set: No Events, Events, Intrusion, and Natural Events. Table 1 summarizes the scenarios, and a brief explanation of each category is provided in the data set” should be “The experiment applied a data set that contained 128 features recorded using PMUs from 1 to 4 and relay snort alarms and logs as in Ref. [24]. A PMU measures electric waves on a power network using a common time source. A total of 29 features could be measured by every PMU [24]. The data set also contains twelve columns of log data from the control panel and one column of an actual tag. There are three main categories of scenarios in the multiclass classification data set: No Events, Events, Intrusion, and Natural Events such as storms and tornadoes [25]”.
7—In (c) “various levels ([10 to 19] %, [20 to 79] %, [80 to 90] %) of the TLs”, should be “various levels of the TLs”.
8—In (d), “single relays (R [1–4]) or double relays (R3 and R4, R1 and R2).” should be “single relays or double relays”.
9—In (e) “TLs with R1 or R2 or R3 or R4 deactivated and fault” should be “TLs with relays deactivated and faults”.
10—Table 1. Explanation of scenarios should be removed.
11—In Section 2.2, Reference “[22]” should be “[26]”.
12—In Section 2.2, References “[11,12]” should be “[14,15]”.
13—In Section 2.2, “Technically, it is possible to construct novel features using a combination of attributes that could help more effectively utilize possible types of data instances, which could be used in machine learning models for better application. It is worth noting that we made use of the random forest method to create and classify features. Finally, based on anticipation weighted voting, 37 various case studies were implemented for simulation purposes.”, should be updated to “Technically, it is possible to construct novel features using the PCA as the feature selection model that could help to more effectively utilize possible types of data instances which could be used in machine learning models for better application”.
14— Section 2.3 should be inserted after Section 2.2 as follows:
2.3. Feature Selection Based on PCA
The presence of redundant or irrelevant features could impede the performance of a machine learning classifier, causing slow convergence or complete failure. To address this issue, this paper employs a PCA, also known as the Karhunen–Loeve transform or the eigenvector regression filter [27]. A PCA reduces dimensionality by eliminating the weakest principal components, resulting in a lower-dimensional projection of the raw feature data that preserves maximal data variance. This reduction is achieved through an orthogonal, linear projection operation. It is worth noting that the PCA operation does not result in any loss of generality.
Y = X C
The projected data matrix Y R S × P contains P principal components of X , where P is less than or equal to N . The key step involves determining the projection matrix C R N × P , which can be accomplished by finding the eigenvectors of X ’s covariance matrix or by solving a singular value decomposition (SVD) problem for X [28].
X = U D V T
The orthogonal matrices U R S × S and V R N × N represent the column and row spaces of X , respectively, while D is a diagonal matrix that contains the singular values λ n , for n = 0 ,   ,   N 1 . The singular values are arranged non-increasingly along the diagonal of D . It has been demonstrated [28] that the projection matrix C can be derived from the first P columns of V , with P being the desired number of principal components.
V = [ v 1 , , v N ]
and
C = [ c 1 , , c P ]
In which v n R N × 1 defines the n t h right singular vector of X , and v n equals c n   ( c n = v n ) .
The singular values in D from (2) indicate the standard deviations of X along the principal directions in the space spanned by the columns of C . The value of λ n 2 represents the variance in X ' s projection along the n t h principal component direction. Variance is often used as a measure of the amount of information contributed by a component to the data representation. To evaluate this, the cumulative explained variance ratio of the principal components is typically examined and expressed as a fraction.
R c e v = n = 1 P λ n 2 n = 1 N λ n 2
15—Section 2.4 should be “Diagnosing Attack Behavior Model Structure”.
16—In Section 2.4, Reference [24] should be added after “electrical grids” in the first paragraph, and one sentence “(In this paper, PCA is used as the feature selection model)” should be added at the end of the second paragraph.
17—The correct figure and caption of Figure 2 show below:
18—Section “2.4” should be updated to “2.5.”, “2.4.1” updated to “2.5.1”, and “2.4.2” updated to “2.5.2” and other numbers reordered accordingly.
19—The sentence “Table 2 shows the name, explanation, and extraction process of the extracted feature” should be removed, and Table 2 as well.
20—Equation (1) becomes (6), and all equation numbers should be reordered accordingly.
21—“2.5.3. Establish Classifier Layouts” should be updated as follows:
2.5.3. Establish Classifier Layouts
Following a series of tests using various machine learning classifiers, a DT classifier was selected due to its superior performance. The sigmoid layer’s fusion activation function is defined by the equation provided below.
F 1 = k = 1 n y k log t k w s + 1 y k log 1 t k w l
In which F 1 defines the sigmoid layer’s fusion activation function, y k shows the k t h   pattern’s tag, t k   defines the k t h pattern’s prediction, and w l and w s define the stable pattern and unstable pattern, respectively [31].
A for loop was used to test the Autoencoders (AEs) with varying numbers of layers, neurons, batch sizes, loss and activation functions, optimizers, epochs, and dropout layers in order to improve accuracy and the f-measure. Both Stacked Autoencoder (SAE) and Deep Neural Network (DNN) models utilize the Binary Cross-Entropy (BCE) cost function and the Rectified Linear Unit (ReLU) activation function to achieve optimal performance, as represented by the performance metrics.
R e L U x = m a x ( 0 , x )
In which x defines the observation.
2.5.4. Proposed Machine Learning
An advanced deep learning approach is presented to make a powerful detector for the system. The proposed approach involves building a deep base model to learn representative features. To ensure diversity in the base model, multiple deep autoencoders were created, including an SAE, a Denoising Autoencoder (DAE), and linear decoder methods. Each of these models was trained using unique datasets generated through the Bootstrap method. To this end, the characteristics were first selected. Secondly, deep base models were developed to adaptively learn hidden characteristics from the exploited indexes obtained. To ensure diversity in the base patterns, deep autoencoders were constructed using SAE, DAE, and linear decoder methods.
22—Section 3.1 “Data Set” section should be modified as follows:
A multiclass classification data set for ICS cyber-attacks is used in the present study. There are several terms applied in machine learning that require an explanation. The true positive (TP) is the positive sample that the layout predicts to be positive, the false positive (FP) is the negative sample that the layout predicts to be positive, and the false negative (FN) is the positive sample that the model predicts to be negative, the true negative (TN) is the negative sample that the model predicts to be negative. The suggested layout is evaluated using accuracy, precision, recall, and F1 score. An F1 score is basically the harmonic value of precision and recall, which are calculated according to the following equations:
23—Remove Table 3.
24—Section 3.2.1 should be updated as follows:
3.2.1. Machine Learning Model
In this experiment, KNN, SVM, GBDT, XGBoost, CNN, and others were applied as conventional models [24,25,32–35].
Actually, the main purpose of this research is to show the high and successful role of the deep learning models in reinforcing the smart grid against various cyber-attacks. In this regard, the proposed model would detect and stop cyber-hacking at the installation location rather than focusing on the cyber-attack type. Therefore, the localization procedure would be attained through the diverse detection models located in the smart grid, but the cyber-attack type detection requires more data that can be made later based on the recorded abnormal data.
25—Section 3.2.2 “Outcomes” should be updated as follows:
In order to determine the need for various models (fault analysis), we performed some comparative experiments according to various PMU kinds. In one group, properties of localization/segmentation are sent to the related DML model in order to train, and in the other one, whole features are sent to various machine learning models. Moreover, it is shown in Table 1 that data can be effectively split according to the PMU resources. Splitting the data can enhance the accuracy of classification models as well as reduce data dimensions and enhance training speed and minimize computing sources.
Several corresponding experiments are conducted on various ways of replacing abnormal values in data. Table 2 shows the outcomes. The replacement method is shown in the left column, and the suggested approach is represented by l o g _ m e a n . Zero shows a process to replace NAN and INF with zero values, and mean shows a process to replace with the mean value. The proposed model is utilized as a trial model, and the accuracy is adopted as the assessment metrics, that is, the Log-mean column in Table 2.
Applying the l o g _ m e a n   technique for replacing the unusual amount in the data is intuitively the best approach. According to the outcome, the suggested process in order to process abnormal values has proven successful.
Table 3 shows the suggested method with PCA in compare of other selection method. As can be seen the accuracy rate of the suggested method with PCA is better than other methods.
Comparison experiments are also conducted to verify feature selection. First, the significance of the original features is determined, and afterward, they are arranged based on significance. A variety of mixtures of features has been selected for training, and Table 4 shows these outcomes.
The approach was verified practically through a comparative test. The test extracts the test group and training group from 15 multiclass data sets in a 9:1 ratio at random, and afterward, these data sets have been combined into 1 training group. The training group has been transferred to the layout to train and learn. Table 5 presents the outcomes of 15 test sets transferred to the model for practically simulating the efficiency of the model applications. It is apparent that the model’s accuracy has decreased. It is because data interaction would occur by increasing the number of data resulting in changing the model, and whenever whole data has been combined, there would unavoidably be abnormal points and noises. Due to the fact that such noises and anomalies have not been separated in training, the model’s indexes alter, and the robustness decreases.
Firstly, the efficacy of the features created from the feature construction engineering in the model is determined by sorting the significance of features. Model interpretability can be determined by determining the significance of features. Weights, gain, cover, and so on are general indicators of feature significance [25].
The test trains 15 sets of multiclass classification data sets and tests respectively and uses accuracy as an assessment metric [24]. The accuracy of the trail data sent to the layout before and after optimization based on the main 128 properties is shown in Figure 3, Figure 4 and Figure 5. The classification accuracy of the trail group on various layouts with default variables is shown in Figure 3, and the accuracy of the trail group on the layout applying optimized variables is represented in Figure 4. For a more intuitive visualization of the variation in accuracy after layouts are optimized, Figure 3 and Figure 4 are combined, and the mean of the accuracy values for whole sets are adopted, i.e., Figure 5. Figure 3, Figure 4 and Figure 5 shows that the SVM layout with default variables has an accuracy of approximately 0.30, but after optimization, it grows to 0.85, which represents a near 200% advancement. Other models have improved significantly in accuracy after optimization as well. The best accuracy of the proposed model is 0.925. The test set had better performance on the model suggested in this study in comparison to the conventional DML and CNN, as shown in Figure 3, Figure 4 and Figure 5.
A true decision is obtained when the detection layout produces the correct result. Conversely, a false decision indicates a false response from the cyber-attack detection layout and can lead to decreased reliability. Therefore, it is important to develop an anomaly detection layout with low false rates. Four criteria, namely Correct Reject Rate (CR), Miss Rate (MR), False Alarm Rate (FR), and Hit Rate (HR), can be used to assess the effectiveness of the layout. To better understand these criteria, a confusion matrix is provided in Table 6.
In order to evaluate the performance of the suggested detection mechanism for detecting cyber-attacks and anomalies in smart grids, the cyber-attack models are applied. The evaluation outcomes were recorded and are presented in Table 7 and Table 8. From the tables, it can be observed that the proposed detection mechanism is highly effective in detecting cyber-attacks, with a detection accuracy rate of over 97%. This indicates that the suggested detection method is capable of accurately detecting FDI attacks and can be considered an efficient solution to the problem. The evaluation results demonstrate the effectiveness of the suggested detection mechanism for detecting cyber-attacks in smart grids, and highlight the potential of deep machine learning methods with PCA and DT for addressing challenges in the field of cyber security.
26—The conclusion section should be updated as follows:
4. Conclusions
This study proposes a new deep model and feature selection approach for identifying faults and cyber-attacks in electrical systems using various smart grid information and data analysis. Different DML assessment indexes with PCA and DT were used to evaluate the suggested model and conventional DML methods. The results showed that the information analyzing process improves the model’s accuracy and the proposed layout detects various types of behavior in smart grids efficiently. Machine learning with PCA and DT can be used in the power grid to assist operators in making decisions, such as detecting abnormality in data gathering and estimating the system status if data readings from any PMU are unusual. According to the results, the proposed method can accurately and efficiently detect cyber-attacks in smart grids. Furthermore, the study concluded that the proposed model demonstrates good performance in detecting destructive attacks with different intensities. The outcomes of two different metrics, namely the detection rate and the confusion matrix, support the precision and reliability of the proposed anomaly detection approach.
27—The citations should be reordered and updated as follows:
  • Almalaq, A.; Albadran, S.; Alghadhban, A.; Jin, T.; Mohamed, M.A. An Effective Hybrid-Energy Framework for Grid Vulnerability Alleviation under Cyber-Stealthy Intrusions. Mathematics 2022, 10, 2510. https://0-doi-org.brum.beds.ac.uk/10.3390/math10142510.
  • Al-Abassi, A.; Karimipour, H.; Dehghantanha, A.; Parizi, R.M. An ensemble deep learning-based cyber-attack detection in industrial control system. IEEE Access 2020, 8, 83965–83973.
  • Zhang, F.; Kodituwakku, H.A.; Hines, J.W.; Coble, J. Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data. IEEE Trans. Ind. Inform. 2019, 15, 4362–4369.
  • Cyber-Attack against Ukrainian Critical Infrastructure. 2016. Available online: https://www.cisa.gov/news-events/ics-alerts/ir-alert-h-16-056-01 (accessed on 11 January 2024).
  • Reich, J.; Schneider, D.; Sorokos, I.; Papadopoulos, Y.; Kelly, T.; Wei, R.; Armengaud, E.; Kaypmaz, C. Engineering of Runtime Safety Monitors for Cyber-Physical Systems with Digital Dependability Identities. In Proceedings of the International Conference on Computer Safety, Reliability, and Security, Lisbon, Portugal, 15 September 2020; Springer: Cham, Switzerland, 2020; pp. 3–17.
  • Li, Y.; Wang, B.; Wang, H.; Ma, F.; Zhang, J.; Ma, H.; Mohamed, M.A. Importance Assessment of Communication Equipment in Cyber-Physical Coupled Distribution Network Based on Dynamic Node Failure Mechanism. Front. Energy Res. 2022, 10, 911985. https://0-doi-org.brum.beds.ac.uk/10.3389/fenrg.2022.911985.
  • Zhang, L.; Cheng, L.; Alsokhiry, F.; Mohamed, M.A. A Novel Stochastic Blockchain-Based Energy Management in Smart Cities Using V2S and V2G. IEEE Trans. Intell. Transp. Syst. 2022, 24, 915–922. https://0-doi-org.brum.beds.ac.uk/10.1109/TITS.2022.3143146.
  • Chen, J.; Alnowibet, K.; Annuk, A.; Mohamed, M.A. An effective distributed approach based machine learning for energy negotiation in networked microgrids. Energy Strategy Rev. 2021, 38, 100760.
  • Al-Mhiqani, M.N.; Ahmad, R.; Yassin, W.; Hassan, A.; Abidin, Z.Z.; Ali, N.S.; Abdulkareem, K.H. Cyber-security incidents: A review cases in cyber-physical systems. Int. J. Adv. Comput. Sci. Appl. 2018, 1, 499–508.
  • Luo, Y.; Cheng, L.; Liang, Y.; Fu, J.; Peng, G. Deepnoise: Learning sensor and process noise to detect data integrity attacks in CPS. China Commun. 2021, 18, 192–209.
  • Kaouk, M.; Flaus, J.M.; Potet, M.L.; Groz, R. A review of intrusion detection systems for industrial control systems. In Proceedings of the 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT), Paris, France, 23 April 2019; IEEE: Toulouse, France, 2019; pp. 1699–1704.
  • Dehghani, M.; Kavousi-Fard, A.; Dabbaghjamanesh, M.; Avatefipour, O. Deep learning based method for false data injection attack detection in AC smart islands. IET Gener. Transm. Distrib. 2020, 14, 5756–5765.
  • Taormina, R.; Galelli, S.; Tippenhauer, N.O.; Salomons, E.; Ostfeld, A.; Eliades, D.G.; Aghashahi, M.; Sundararajan, R.; Pourahmadi, M.; Banks, M.K.; et al. Battle of the attack detection algorithms: Disclosing cyber-attacks on water distribution networks. J. Water Resour. Plan. Manag. 2018, 144, 04018048.
  • Chang, Q.; Ma, X.; Chen, M.; Gao, X.; Dehghani, M. A deep learning based secured energy management framework within a smart island. Sustain. Cities Soc. 2021, 70, 102938.
  • Keshk, M.; Sitnikova, E.; Moustafa, N.; Hu, J.; Khalil, I. An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems. IEEE Trans. Sustain. Comput. 2019, 6, 66–79.
  • Huang, Y.; He, T.; Chaudhuri, N.R.; la Porta, T. Preventing Outages under Coordinated Cyber-Physical Attack with Secured PMUs. IEEE Trans. Smart Grid 2022, 13, 3160–3173. https://0-doi-org.brum.beds.ac.uk/10.1109/TSG.2022.3165768.
  • Alexopoulos, T.A.; Korres, G.N.; Manousakis, N.M. Complementarity reformulations for false data injection attacks on pmu-only state estimation. Electr. Power Syst. Res. 2020, 189, 106796.
  • Alexopoulos, T.A.; Manousakis, N.M.; Korres, G.N. Fault location observability using phasor measurements units via semidefinite programming. IEEE Access 2016, 4, 5187–5195.
  • Mamuya, Y.D.; Lee, Y.-D.; Shen, J.-W.; Shafiullah, M.; Kuo, C.-C. Application of Machine Learning for Fault Classification and Location in a Radial Distribution Grid. Appl. Sci. 2020, 10, 4965. https://0-doi-org.brum.beds.ac.uk/10.3390/app10144965.
  • Chaithanya, P.S.; Priyanga, S.; Pravinraj, S.; Sriram, V.S. SSO-IF: An Outlier Detection Approach for Intrusion Detection in SCADA Systems. In Inventive Communication and Computational Technologies; Springer: Singapore, 2020; pp. 921–929.
  • Chen, J.; Mohamed, M.A.; Dampage, U.; Rezaei, M.; Salmen, S.H.; Obaid, S.A.; Annuk, A. A multi-layer security scheme for mitigating smart grid vulnerability against faults and cyber-attacks. Appl. Sci. 2021, 11, 9972.
  • Avatefipour, O.; Al-Sumaiti, A.S.; El-Sherbeeny, A.M.; Awwad, E.M.; Elmeligy, M.A.; Mohamed, M.A.; Malik, H. An intelligent secured framework for cyberattack detection in electric vehicles’ CAN bus using machine learning. IEEE Access 2019, 7, 127580–127592.
  • Wang, B.; Ma, F.; Ge, L.; Ma, H.; Wang, H.; Mohamed, M.A. Icing-EdgeNet: A pruning lightweight edge intelligent method of discriminative driving channel for ice thickness of transmission lines. IEEE Trans. Instrum. Meas. 2020, 70, 1–12.
  • Wang, D.; Wang, X.; Zhang, Y.; Jin, L. Detection of power grid disturbances and cyber-attacks based on machine learning. J. Inf. Secur. Appl. 2019, 46, 42–52.
  • Alnowibet, K.; Annuk, A.; Dampage, U.; Mohamed, M.A. Effective energy management via false data detection scheme for the interconnected smart energy hub–microgrid system under stochastic framework. Sustainability 2021, 13, 11836.
  • Chen, L.; Liu, Z.; Tong, L.; Jiang, Z.; Wang, S.; Dong, J.; Zhou, H. Underwater object detection using Invert Multi-Class Adaboost with deep learning. In Proceedings of the 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK, 19 July 2020; IEEE: Toulouse, France, 2020; pp. 1–8.
  • Gonzales, R.C.; Wintz, P. Digital Image Processing; Addison-Wesley Longman Publishing Co., Inc.: Upper Saddle River, NJ, USA, 1987.
  • Goodfellow, I.; Bengio, Y.; Courville, A. Deep Learning; MIT Press: Cambridge, MA, USA, 2016.
  • Shafizadeh-Moghadam, H. Fully component selection: An efficient combination of feature selection and principal component analysis to increase model performance. Expert Syst. Appl. 2021, 186, 115678.
  • Roshan, K.; Zafar, A. Deep Learning Approaches for Anomaly and Intrusion Detection in Computer Network: A Review. Cyber Secur. Digit. Forensics 2022, 73, 551–563.
  • Jahromi, A.N.; Karimipour, H.; Dehghantanha, A.; Choo, K.-K.R. Toward detection and attribution of cyber-attacks in IoT-enabled cyber–physical systems. IEEE Internet Things J. 2021, 8, 13712–13722. https://0-doi-org.brum.beds.ac.uk/10.1109/JIOT.2021.3067667.
  • Pham, B.T.; Bui, D.T.; Prakash, I.; Nguyen, L.H.; Dholakia, M.B. A comparative study of sequential minimal optimization-based support vector machines, vote feature intervals, and logistic regression in landslide susceptibility assessment using GIS. Environ. Earth Sci. 2017, 76, 371.
  • Jena, M.; Dehuri, S. Decision tree for classification and regression: A state-of-the art review. Informatica 2020, 44, 405–420.
  • Chen, R.C.; Caraka, R.E.; Arnita, N.E.; Pomalingo, S.; Rachman, A.; Toharudin, T.; Tai, S.K.; Pardamean, B. An end to end of scalable tree boosting system. Sylwan 2020, 164, 140–151.
  • Zhang, Z.; Zhang, Y.; Guo, D.; Song, M. A scalable network intrusion detection system towards detecting, discovering, and learning unknown attacks. Int. J. Mach. Learn. Cybern. 2021, 12, 1649–1665.
The authors state that the scientific conclusions are unaffected. This correction was approved by the Academic Editor. The original publication has also been updated.

Reference

  1. Almalaq, A.; Albadran, S.; Mohamed, M.A. Deep machine learning model-based cyber-attacks detection in smart power systems. Mathematics 2022, 10, 2574. [Google Scholar] [CrossRef]
Figure 2. Overview of layout to detect cyber-attacks in smart grids.
Figure 2. Overview of layout to detect cyber-attacks in smart grids.
Mathematics 12 00934 g002
Figure 3. Precision over 15 data sets through applying default variables.
Figure 3. Precision over 15 data sets through applying default variables.
Mathematics 12 00934 g003
Figure 4. Precision over 15 data sets through applying optimum variables.
Figure 4. Precision over 15 data sets through applying optimum variables.
Mathematics 12 00934 g004
Figure 5. Mean accuracy comparison.
Figure 5. Mean accuracy comparison.
Mathematics 12 00934 g005
Table 1. Transfer diverse characteristics to the layout for comparison.
Table 1. Transfer diverse characteristics to the layout for comparison.
TechniqueCharacteristics
EntireSplit
Accuracy0.93440.9387
Table 2. Diverse methods to procedure INF and NAN.
Table 2. Diverse methods to procedure INF and NAN.
MethodZeroMeanLog-Mean
Accuracy0.93610.93420.9387
Table 3. Accuracy rate of various feature selection method.
Table 3. Accuracy rate of various feature selection method.
MethodPCAPSO AlgorithmK-Means ClusteringSVM
Accuracy0.93870.87410.91340.902
Table 4. Assessment of characteristics chosen.
Table 4. Assessment of characteristics chosen.
CharacteristicsOnly New Characteristics25% Main Characteristics and New Characteristics50% Main Characteristics and New Characteristics
Mean accuracy0.74920.93490.9334
Characteristics75% Main Characteristics and New Characteristics100% Main Characteristics and New Characteristics
Mean accuracy0.9330.9353
Table 5. Layout accuracy on 15 trails sets in the actual simulation.
Table 5. Layout accuracy on 15 trails sets in the actual simulation.
Data setData 1Data 2Data 3Data 4Data 5Data 6Data 7Data 8
Data number0.88940.86990.90970.88300.90920.90960.90660.9193
Data setData 9Data 10Data 11Data 12Data 13Data 14Data 15Entire
Data number0.90830.92290.92410.90070.90160.89660.91300.9043
Table 6. Confusion matrix of proposed scheme.
Table 6. Confusion matrix of proposed scheme.
Actual Value
Detection Scheme Response PositivesNegatives
PositivesTrue PositiveFalse Positive
NegativesFalse NegativeTrue Negative
Table 7. The proposed detection scheme.
Table 7. The proposed detection scheme.
LabelNumber of Testing DataIdentified to Be CompromisedIdentified to Be NormalDetection Accuracy (%)
Compromised1759165110893.87
Normal139481131394.17
Table 8. Confusion matrix of the proposed detection scheme.
Table 8. Confusion matrix of the proposed detection scheme.
Actual Value
Detection Scheme Response PositivesNegatives
Positives93.87%5.83%
Negatives6.13%94.17%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Almalaq, A.; Albadran, S.; Mohamed, M.A. Correction: Almalaq et al. Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems. Mathematics 2022, 10, 2574. Mathematics 2024, 12, 934. https://0-doi-org.brum.beds.ac.uk/10.3390/math12070934

AMA Style

Almalaq A, Albadran S, Mohamed MA. Correction: Almalaq et al. Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems. Mathematics 2022, 10, 2574. Mathematics. 2024; 12(7):934. https://0-doi-org.brum.beds.ac.uk/10.3390/math12070934

Chicago/Turabian Style

Almalaq, Abdulaziz, Saleh Albadran, and Mohamed A. Mohamed. 2024. "Correction: Almalaq et al. Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems. Mathematics 2022, 10, 2574" Mathematics 12, no. 7: 934. https://0-doi-org.brum.beds.ac.uk/10.3390/math12070934

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop