Home Application of integrated learning in power grid fake data intrusion detection
Article
Licensed
Unlicensed Requires Authentication

Application of integrated learning in power grid fake data intrusion detection

  • Yan Zeng ORCID logo EMAIL logo , Siwei Wang , Wenli Chen , Yingying Cheng , Guangcheng Xie , Wenbo Yao and Yu Su
Published/Copyright: June 30, 2025
Become an author with De Gruyter Brill

Abstract

Cybersecurity is a critical component influencing the safe and stable operation of the smart grid, as the smart grid (SG) is an information-physical fusion system (also known as a Cyber-Physical System [CPS]) integrating sensing, communication, computation, decision-making, and control built on the foundation of the traditional grid. The most common cyberattack that compromises data integrity in the smart grid is the False Date Injection Attack (FDIA). If this type of attack is not discovered in time, it can take control of physical equipment or target a network transmission line to obstruct control decisions, which can result in power network failure or even a cascade failure in the grid. An integrated learning-based detection method is currently proposed to biclassify power grid data in order to address the issues of low accuracy, high false detection rate, and poor model differentiation ability when applying a single classifier in machine learning to detect false data. The integrated learning detection method is based on GBDT (Gradient Boosting Decision Tree), XGBoost, and Light GBM, with RF- Light GBM and Bagging classifier as the base classifiers, which are integrated by voting strategy after Bayesian tuning. Following simulation experiments, the algorithm is able to significantly outperform the checking rate and accuracy of traditional detection algorithms in detecting false data on the power grid by effectively addressing the issues of low checking rate and accuracy of single classifier detection as well as instability of single classifier detection.


Corresponding author: Yan Zeng, State Grid Chongqing Marketing Service Center, Chongqing City 401123, China, E-mail:

Acknowledgments

The authors would like to show sincere thanks to those techniques who have contributed to this research.

  1. Research ethics: This article does not contain any studies with human participants performed by any of the authors.

  2. Informed consent: Not applicable.

  3. Author contributions: Yan Zeng, Siwei Wang, Wenli Chen, Yingying Cheng, is responsible for designing the framework, analyzing the performance, validating the results, and writing the article. Guangcheng Xie, Wenbo Yao, Yu Su, is responsible for collecting the information required for the framework, provision of software, critical review, and administering the process.

  4. Use of Large Language Models, AI and Machine Learning Tools: None declared.

  5. Conflict of interest: The authors declared that they have no conflicts of interest regarding this work.

  6. Research funding: There is no specific funding to support this research.

  7. Data availability: The experimental data used to support the findings of this study are available from the corresponding author upon request.

References

1. Bharadiya, JP. A comparative study of business intelligence and artificial intelligence with big data analytics. Am J Artif Intell 2023;7:24.Search in Google Scholar

2. Movassagh, AA, Alzubi, JA, Gheisari, M, Rahimi, M, Mohan, S, Abbasi, AA, et al.. Artificial neural networks training algorithm integrating invasive weed optimization with differential evolutionary model. J Ambient Intell Hum Comput 2021:1–9. https://doi.org/10.1007/s12652-020-02623-6.Search in Google Scholar

3. Alzubi, OA, Qiqieh, I, Alzubi, JA. Fusion of deep learning-based cyberattack detection and classification model for intelligent systems. Clust Comput 2023;26:1363–74. https://doi.org/10.1007/s10586-022-03686-0.Search in Google Scholar

4. Upadhyay, D, Manero, J, Zaman, M, Sampalli, S. Gradient boosting feature selection with machine learning classifiers for intrusion detection on power grids. IEEE Trans Netw Serv Manag 2020;18:1104–16. https://doi.org/10.1109/tnsm.2020.3032618.Search in Google Scholar

5. Choithani, T, Chowdhury, A, Patel, S, Patel, P, Patel, D, Shah, M. A comprehensive study of artificial intelligence and cybersecurity on Bitcoin, cryptocurrency and banking system. Ann Data Sci 2022:1–33. https://doi.org/10.1007/s40745-022-00433-5.Search in Google Scholar PubMed PubMed Central

6. Alzubi, OA, Alzubi, JA, Alazab, M, Alrabea, A, Awajan, A, Qiqieh, I. Optimized machine learning-based intrusion detection system for fog and edge computing environment. Electron 2022;11:3007. https://doi.org/10.3390/electronics11193007.Search in Google Scholar

7. Alzubi, OA, Alzubi, JA, Alzubi, TM, Singh, A. Quantum mayfly optimization with encoder-decoder driven LSTM networks for malware detection and classification model. Mobile Network Appl 2023:1–13. https://doi.org/10.1007/s11036-023-02105-x.Search in Google Scholar

8. Kumar, R, Kumar, P, Tripathi, R, Gupta, GP, Garg, S, Hassan, MM. A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network. J Parallel Distr Comput 2022;164:55–68. https://doi.org/10.1016/j.jpdc.2022.01.030.Search in Google Scholar

9. Jamalipour, A, Murali, S. A taxonomy of machine-learning-based intrusion detection systems for the internet of things: a survey. IEEE Internet Things J 2021;9:9444–66. https://doi.org/10.1109/jiot.2021.3126811.Search in Google Scholar

10. Durairaj, D, Venkatasamy, TK, Mehbodniya, A, Umar, S, Alam, T. Intrusion detection and mitigation of attacks in microgrid using enhanced deep belief network. Energy Sources, Part A Recovery, Util Environ Eff 2022:1–23. https://doi.org/10.1080/15567036.2021.2023237.Search in Google Scholar

11. Wang, X, Liu, J, Zhang, C. Network intrusion detection based on multi-domain data and ensemble-bidirectional LSTM. EURASIP J Inform Secur 2023;2023:5.10.1186/s13635-023-00139-ySearch in Google Scholar

12. Upadhyay, D, Manero, J, Zaman, M, Sampalli, S. Intrusion detection in SCADA based power grids: recursive feature elimination model with majority vote ensemble algorithm. IEEE Trans Netw Sci Eng 2021;8:2559–74. https://doi.org/10.1109/tnse.2021.3099371.Search in Google Scholar

13. Albulayhi, K, Smadi, AA, Sheldon, FT, Abercrombie, RK. IoT intrusion detection taxonomy, reference architecture, and analyses. Sensors 2021;21:6432. https://doi.org/10.3390/s21196432.Search in Google Scholar PubMed PubMed Central

14. Saeed, MM. A real-time adaptive network intrusion detection for streaming data: a hybrid approach. Neural Comput Appl 2022;34:6227–40. https://doi.org/10.1007/s00521-021-06786-x.Search in Google Scholar

15. Rachmawati, A, Yossaepurrohman. Analysis of machine learning systems for cyber physical systems. Int Trans Educ Technol 2022;1:1–9. https://doi.org/10.34306/itee.v1i1.170.Search in Google Scholar

16. Sood, T, Prakash, S, Sharma, S, Singh, A, Choubey, H. Intrusion detection system in wireless sensor network using conditional generative adversarial network. Wirel Pers Commun 2022;126:911–31. https://doi.org/10.1007/s11277-022-09776-x.Search in Google Scholar

17. ElKashlan, M, Elsayed, MS, Jurcut, AD, Azer, M. A machine learning-based intrusion detection system for IoT electric vehicle charging stations (EVCSs). Electronics 2023;12:1044. https://doi.org/10.3390/electronics12041044.Search in Google Scholar

18. Nazir, A, He, J, Zhu, N, Wajahat, A, Ullah, F, Qureshi, S, et al.. Collaborative threat intelligence: enhancing IoT security through blockchain and machine learning integration. J King Saud Univ Comput Inf Sci 2024;36:101939.10.1016/j.jksuci.2024.101939Search in Google Scholar

19. Li, B, Wu, Y, Song, J, Lu, R, Li, T, Zhao, L. DeepFed: federated deep learning for intrusion detection in industrial cyber–physical systems. IEEE Trans Ind Inf 2020;17:5615–24. https://doi.org/10.1109/tii.2020.3023430.Search in Google Scholar

20. Ramana, K, Revathi, A, Gayathri, A, Jhaveri, RH, Narayana, CL, Kumar, BN. WOGRU-IDS – an intelligent intrusion detection system for IoT assisted wireless sensor networks. Comput Commun 2022;196:195–206. https://doi.org/10.1016/j.comcom.2022.10.001.Search in Google Scholar

21. Ghazal, TM, Lee, SW, Rehman, A. Data fusion-based machine learning architecture for intrusion detection. Comput Mater Continua 2022;70:3399–413. https://doi.org/10.32604/cmc.2022.020173.Search in Google Scholar

22. Aleesa, AM, Zaidan, BB, Zaidan, AA, Sahar, NM. Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions. Neural Comput Appl 2020;32:9827–58. https://doi.org/10.1007/s00521-019-04557-3.Search in Google Scholar

23. Yang, Y, Zheng, K, Wu, B, Yang, Y, Wang, X. Network intrusion detection based on supervised adversarial variational auto-encoder with regularization. IEEE Access 2020;8:42169–84. https://doi.org/10.1109/access.2020.2977007.Search in Google Scholar

24. Ullah, MU, Hassan, A, Asif, M, Farooq, MS, Saleem, M. Intelligent intrusion detection system for Apache web server empowered with machine learning approaches. Int J Comput Innov Sci 2022;1:21–7.Search in Google Scholar

25. Samudrala, VK. AI-powered anomaly detection for cross-cloud secure data sharing in multi-cloud healthcare networks. Curr Sci Hum 2020;8:11–22.Search in Google Scholar

26. Swapna, N. Big data privacy and security using continuous data protection data obliviousness methodologies. J Sci Technol 2022;07:423–36.Search in Google Scholar

27. Kabla, AHH, Anbar, M, Manickam, S, Al-Amiedy, TA, Cruspe, PB, Al-Ani, AK, et al.. Applicability of intrusion detection system on Ethereum attacks: a comprehensive review. IEEE Access 2022;10:71632–55. https://doi.org/10.1109/access.2022.3188637.Search in Google Scholar

28. Al-Asiri, M, El-Alfy, ESM. On using physical based intrusion detection in SCADA systems. Procedia Comput Sci 2020;170:34–42. https://doi.org/10.1016/j.procs.2020.03.007.Search in Google Scholar

29. Sahani, N, Zhu, R, Cho, JH, Liu, CC. Machine learning-based intrusion detection for smart grid computing: a survey. ACM Trans Cyber-Phys Syst 2023;7:1–31. https://doi.org/10.1145/3578366.Search in Google Scholar

30. Zhao, H, Liu, G, Sun, H, Zhong, G, Pang, S, Qiao, S, et al.. An enhanced intrusion detection method for AIM of smart grid. J Ambient Intell Hum Comput 2023:1–13. https://doi.org/10.1007/s12652-023-04538-4.Search in Google Scholar

31. Zhu, Y, Cui, L, Ding, Z, Li, L, Liu, Y, Hao, Z. Black box attack and network intrusion detection using machine learning for malicious traffic. Comput Secur 2022;123:102922. https://doi.org/10.1016/j.cose.2022.102922.Search in Google Scholar

32. Seyfollahi, A, Ghaffari, A. A review of intrusion detection systems in RPL routing protocol based on machine learning for internet of things applications. Wireless Commun Mobile Comput 2021;2021:1–32. https://doi.org/10.1155/2021/8414503.Search in Google Scholar

Received: 2024-12-18
Accepted: 2025-06-05
Published Online: 2025-06-30

© 2025 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 11.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/ijeeps-2024-0390/html
Scroll to top button