Performance Comparison of Machine Learning Methods in DDoS Attack Detection in Smart Grids

Edwin Meriaux, David Koehler, Md Zahidul Islam, Vinod Vokkarane, Yuzhang Lin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The integration of the cyber-network with the physical power grid makes it prone to cyber-Attacks disrupting the normal operation of the grid and therefore critical to detect. This paper compares how the detection of Distributed Denial of Service (DDOS) attacks, one of the most common types of cyber-Attack, on smart grids varies depending on the Machine Learning (ML) method used for detection, the different datasets used for the training, and the features of the dataset incorporated in the training. The most commonly used datasets namely KDDCup'99 and CICIDS'17 datasets are adapted for the sake of testing. The different ML methods used for these experiments are Decision Tree, Random Forest, Quadratic Discriminant Analysis, Support Vector Machine, Naïve Bayes, and Extreme Gradient Boosting.

Original languageEnglish (US)
Title of host publication2022 IEEE MIT Undergraduate Research Technology Conference, URTC 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665473453
DOIs
StatePublished - 2022
Event2022 IEEE MIT Undergraduate Research Technology Conference, URTC 2022 - Virtual, Online, United States
Duration: Sep 30 2022Oct 2 2022

Publication series

Name2022 IEEE MIT Undergraduate Research Technology Conference, URTC 2022

Conference

Conference2022 IEEE MIT Undergraduate Research Technology Conference, URTC 2022
Country/TerritoryUnited States
CityVirtual, Online
Period9/30/2210/2/22

Keywords

  • CICIDS'17
  • DDOS
  • Decision Tree
  • KDDCup'99
  • Machine Learning
  • Naïve Bayes
  • Quadratic Discriminant Analysis
  • Random Forest
  • Smart Grids
  • Support Vector Analysis
  • XGBoost

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Computer Vision and Pattern Recognition
  • Human-Computer Interaction
  • Media Technology

Fingerprint

Dive into the research topics of 'Performance Comparison of Machine Learning Methods in DDoS Attack Detection in Smart Grids'. Together they form a unique fingerprint.

Cite this