Modified Red Fox Optimizer with Deep Learning enabled False Data Injection Attack Detection

نویسندگان

چکیده

Recently, power systems are drastically developed and shifted towards cyber-physical (CPPS). The CPPS involve numerous sensor devices which generates enormous quantities of information. data gathered from each sensing component needs to accomplish reliability highly prone attacks. Amongst various kinds attacks, false injection attack (FDIA) can seriously affects energy efficiency CPPS. Current driven approach utilized for designing FDIA frequently depends on distinct environmental assumption conditions making them unrealistic ineffective. In this paper, we present a modified Red Fox Optimizer with Deep Learning enabled detection (MRFODL-FDIAD) in the environment. presented MRFODL-FDIAD technique mainly detects classifies FDIAs It encompasses three stage process namely pre-processing, detection, parameter tuning. For uses multihead attention-based long short term memory (MBALSTM) technique. To improve performance MBALSTM model, MRFO be exploited study. experimental evaluation was performed standard IEEE bus system. Extensive set experimentations highlighted supremacy

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Melanoma detection with a deep learning model

Background: Skin cancer is one of the most common forms of cancer in the world and melanoma is the deadliest type of skin cancer. Both melanoma and melanocytic nevi begin in melanocytes (cells that produce melanin). However, melanocytic nevi are benign whereas melanoma is malignant. This work proposes a deep learning model for classification of these two lesions.    Methods: In this analytic s...

متن کامل

Audio Replay Attack Detection with Deep Learning Frameworks

Nowadays spoofing detection is one of the priority research areas in the field of automatic speaker verification. The success of Automatic Speaker Verification Spoofing and Countermeasures (ASVspoof) Challenge 2015 confirmed the impressive perspective in detection of unforeseen spoofing trials based on speech synthesis and voice conversion techniques. However, there is a small number of researc...

متن کامل

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

Vulnerabilities of Smart Grid State Estimation against False Data Injection Attack

In recent years, Information Security has become a notable issue in the energy sector. After the invention of ‘The Stuxnet worm’ [1] in 2010, data integrity, privacy and confidentiality has received significant importance in the real-time operation of the control centres. New methods and frameworks are being developed to protect the National Critical Infrastructures likeenergy sector. In the re...

متن کامل

Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid

In today's Smart Grid, the power Distribution System Operator (DSO) uses real-time measurement data from the Advanced Metering Infrastructure (AMI) for efficient, accurate and advanced monitoring and control. Smart Grids are vulnerable to sophisticated data integrity attacks like the False Data Injection (FDI) attack on the AMI sensors that produce misleading operational decision of the power s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3298056