Feature Selection in Cyber-Attack Detection for Smart Grids Using Machine Learning Techniques and Random Forest

Authors

  • A. Vijaykumar Student, Department of M.C.A, KMMIPS, Tirupati (D.t), Andhra Pradesh, India Author
  • C. Yamini Assistant Professor, Department of M.C.A, KMMIPS, Tirupati (D.t), Andhra Pradesh, India Author

Keywords:

Smart grid security, Cyber-attack detection, Machine learning, Feature selection techniques, Filter methods, Wrapper methods, Embedded methods, Model performance metrics, Resilience, Digital infrastructure protection

Abstract

The full review is now the application of feature selection techniques in machine learning in assessing cyber-attack detection by infrastructure within smart grids. Smart grids are currently becoming automated, communicating, and power-optimized via IoT technologies in energy generation, distribution, and consumption, therefore increasing exposure to cyber vulnerabilities. Feature selection from high-dimensional data becomes critical to building machine learning models, which are efficient and accurate in address timely detection and mitigation of cyber threats. Such an exhaustive review will allow feature selection strategies into three general classes: filter methods, wrapper methods, embedded methods; examine their effect concerning critical performance metrics: accuracy, precision, recall, and computational efficiency; and integrate the findings from recent studies to compare the effectiveness of these techniques for different attack scenarios such as denial-of-service, data injection, and false data manipulation. This translates into identifying trends, challenges, and gaps in contemporary methodologies that provide actionable recommendations and future directions in research aimed at building cyber infrastructures that are more resilient for smart grids and future research.

Downloads

Download data is not yet available.

References

T. Berghout, M. Benbouzid, and S. M. Muyeen, “Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects,” International Journal of Critical Infrastructure Protection, vol. 38, p. 100547, Sep. 2022, doi: 10.1016/J.IJCIP.2022.100547.

J. Sakhnini, H. Karimipour, and A. Dehghantanha, “Smart Grid Cyber Attacks Detection using Supervised Learning and Heuristic Feature Selection,” Proceedings of 2019 the 7th International Conference on Smart Energy Grid Engineering, SEGE 2019, pp. 108–112, Jul. 2019, doi: 10.1109/SEGE.2019.8859946.

T. Berghout, M. Benbouzid, and S. M. Muyeen, “Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects,” International Journal of Critical Infrastructure Protection, vol. 38, p. 100547, Sep. 2022, doi: 10.1016/J.IJCIP.2022.100547.

“(PDF) Smart Grid Cyber Attacks Detection using Supervised Learning and Heuristic Feature Selection.” Accessed: Apr. 16, 2025. [Online]. Available: https://www.researchgate.net/publication/334316566_Smart_Grid_Cyber_Attacks_Detection_using_Supervised_Learning_and_Heuristic_Feature_Selection

T. Berghout, M. Benbouzid, and S. M. Muyeen, “Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects,” International Journal of Critical Infrastructure Protection, vol. 38, p. 100547, Sep. 2022, doi: 10.1016/J.IJCIP.2022.100547.

A. Zibaeirad, F. Koleini, S. Bi, T. Hou, and T. Wang, “A Comprehensive Survey on the Security of Smart Grid: Challenges, Mitigations, and Future Research Opportunities,” Jul. 2024, Accessed: Apr. 16, 2025. [Online]. Available: https://arxiv.org/abs/2407.07966v1

R. C. Borges Hink, J. M. Beaver, M. A. Buckner, T. Morris, U. Adhikari, and S. Pan, “Machine learning for power system disturbance and cyber-attack discrimination,” 7th International Symposium on Resilient Control Systems, ISRCS 2014, Sep. 2014, doi: 10.1109/ISRCS.2014.6900095.

A. Shees, M. Tariq, and A. I. Sarwat, “Cybersecurity in Smart Grids: Detecting False Data Injection Attacks Utilizing Supervised Machine Learning Techniques,” Energies 2024, Vol. 17, Page 5870, vol. 17, no. 23, p. 5870, Nov. 2024, doi: 10.3390/EN17235870.

H. S. Alwageed, “Detection of cyber attacks in smart grids using SVM-boosted machine learning models,” Service Oriented Computing and Applications, vol. 16, no. 4, pp. 313–326, Dec. 2022, doi: 10.1007/S11761-022-00349-1/METRICS.

M. Ozay, I. Esnaola, F. T. Yarman Vural, S. R. Kulkarni, and H. V. Poor, “Machine Learning Methods for Attack Detection in the Smart Grid,” IEEE Trans Neural Netw Learn Syst, vol. 27, no. 8, pp. 1773–1786, Aug. 2015, doi: 10.1109/TNNLS.2015.2404803.

Md. A. M. Hasan, M. Nasser, S. Ahmad, and K. I. Molla, “Feature Selection for Intrusion Detection Using Random Forest,” Journal of Information Security, vol. 07, no. 03, pp. 129–140, 2016, doi: 10.4236/JIS.2016.73009.

M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, Dec. 2009, doi: 10.1109/CISDA.2009.5356528.

K. Turksoy, S. Samadi, J. Feng, E. Littlejohn, L. Quinn, and A. Cinar, “Meal detection in patients with type 1 diabetes: A new module for the multivariable adaptive artificial pancreas control system,” IEEE J Biomed Health Inform, vol. 20, no. 1, pp. 47–54, Jan. 2016, doi: 10.1109/JBHI.2015.2446413.

T. S. Jepsen, C. S. Jensen, and T. D. Nielsen, “Relational Fusion Networks: Graph Convolutional Networks for Road Networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 1, pp. 418–429, Jan. 2022, doi: 10.1109/TITS.2020.3011799.

F. A. Khan, K. Zeb, M. Al-Rakhami, A. Derhab, and S. A. C. Bukhari, “Detection and Prediction of Diabetes Using Data Mining: A Comprehensive Review,” IEEE Access, vol. 9, pp. 43711–43735, 2021, doi: 10.1109/ACCESS.2021.3059343.

Downloads

Published

14-05-2025

Issue

Section

Research Articles