Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3564625.3567969acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article
Open access

DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection

Published: 05 December 2022 Publication History

Abstract

As power grids have evolved, IT has become integral to maintaining reliable power. While providing operators improved situational awareness and the ability to rapidly respond to dynamic situations, IT concurrently increases the cyberattack threat surface – as recent grid attacks such as Blackenergy and Crashoverride illustrate. To defend against such attacks, modern power grids require a system that can maintain reliable power during attacks and detect when these attacks occur to allow for a timely response. To help address limitations of prior work, we propose DRAGON– deep reinforcement learning for autonomous grid operation and attack detection, which (i) autonomously learns how to maintain reliable power operations while (ii) simultaneously detecting cyberattacks. We implement DRAGON and evaluate its effectiveness by simulating different attack scenarios on the IEEE 14 bus power transmission system model. Our experimental results show that DRAGON can maintain safe grid operations 225.5% longer than a state-of-the-art autonomous grid operator. Furthermore, on average, our detection method reports a true positive rate of 92.9% and a false positive rate of 11.4%, while also reducing the false negative rate by 63.1% compared to a recent attack detection method.

References

[1]
Dou An, Qingyu Yang, Wenmao Liu, and Yang Zhang. 2019. Defending against Data Integrity Attacks in Smart Grid: A Deep Reinforcement Learning-based Approach. IEEE Access 7(2019), 110835–110845.
[2]
Wissam Aoudi, Mikel Iturbe, and Magnus Almgren. 2018. Truth Will Out: Departure-based Process-level Detection of Stealthy Attacks on Control Systems. In Proceedings of the Conference on Computer and Communications Security. 817–831.
[3]
Kavya Ashok, Dan Li, Nagi Gebraeel, and Deepak Divan. 2021. Online Detection of Inter-turn Winding Faults in Single-phase Distribution Transformers using Smart Meter Data. IEEE Transactions on Smart Grid 12, 6 (2021), 5073–5083.
[4]
Chen Binbin. 2021. AsprinChina/L2RPN_NIPS_2020_a_PPO_ Solution. https://github.com/AsprinChina/L2RPN_NIPS_2020_a_PPO_Solution original-date: 2020-11-12T03:53:04Z.
[5]
Benedikt Boecking, Willie Neiswanger, Eric Xing, and Artur Dubrawski. 2021. Interactive Weak Supervision: Learning Useful Heuristics for Data Labeling. In International Conference on Learning Representations. https://openreview.net/forum?id=IDFQI9OY6K
[6]
Francesco Cadini, Gian Luca Agliardi, and Enrico Zio. 2017. A Modeling and Simulation Framework for the Reliability/Availability Assessment of a Power Transmission Grid Subject to Cascading Failures under Extreme Weather Conditions. Applied energy 185(2017), 267–279.
[7]
Andrea Carcano, Alessio Coletta, Michele Guglielmi, Marcelo Masera, I Nai Fovino, and Alberto Trombetta. 2011. A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems. IEEE Transactions on Industrial Informatics 7, 2 (2011), 179–186.
[8]
Long Cheng, Ke Tian, and Danfeng Yao. 2017. Orpheus: Enforcing Cyber-physical Execution Semantics to Defend Aagainst Data-oriented Attacks. In Proceedings of the 33rd Annual Computer Security Applications Conference. 315–326.
[9]
Kyong-Tak Cho and Kang G Shin. 2016. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection. In Proceedings of the USENIX Security Symposium. 911–927.
[10]
Alfredo V Clemente, Humberto N Castejón, and Arjun Chandra. 2017. Efficient Parallel Methods for Deep Reinforcement Learning. arXiv preprint arXiv:1705.04862(2017).
[11]
Jose Cordova-Garcia, Xin Wang, Dongliang Xie, Yue Zhao, and Lei Zuo. 2019. Control of Communications-Dependent Cascading Failures in Power Grids. IEEE Transactions on Smart Grid 10, 5 (2019), 5021–5031.
[12]
CrowdStrike. 2022. Falcon Complete: Managed Detection and Response. CrowdStrike Website. https://www.crowdstrike.com/endpoint-security-products/falcon-complete/.
[13]
György Dán and Henrik Sandberg. 2010. Stealth Attacks and Protection Schemes for State Estimators in Power Systems. In Proceedings of the International Conference on Smart grid Communications. IEEE, 214–219.
[14]
Timothy A. Davis and Ekanathan Palamadai Natarajan. 2010. Algorithm 907: KLU, A Direct Sparse Solver for Circuit Simulation Problems. ACM Trans. Math. Softw. 37, 3, Article 36 (sep 2010), 17 pages.
[15]
Benjamin Donnot. 2020. Grid2op- A testbed platform to model sequential decision making in power systems. https://GitHub.com/rte-france/grid2op.
[16]
Benjamin Donnot, Isabelle Guyon, Marc Schoenauer, Patrick Panciatici, and Antoine Marot. 2017. Introducing Machine Learning for Power System Operation Support. In Proceedings of the IREP Symposium.
[17]
Dragos Inc.2019. The Evolution of Cyber Attacks on Electric Operations. https://www.dragos.com/blog/industry-news/the-evolution-of-cyber-attacks-on-electric-operations/.
[18]
Electric Power Research Institute. 2022. Welcome to the AI.EPRI L2RPN challenge portal. https://www.epri.com/l2rpn.
[19]
Mircea Eremia and Mohammad Shahidehpour. 2013. Handbook of Electrical Power System Dynamics: Modeling, Stability, and Control. Vol. 92. John Wiley & Sons.
[20]
FireEye. 2021. Email Security Solution. FireEye website. https://www.fireeye.com/products/email-security.html.
[21]
FireEye. 2021. Endpoint Security Software and Solutions. FireEye Website. https://www.fireeye.com/products/endpoint-security.html.
[22]
David Formby and Raheem Beyah. 2019. Temporal Execution Behavior for Host Anomaly Detection in Programmable Logic Controllers. IEEE Transactions on Information Forensics and Security 15 (2019), 1455–1469.
[23]
David Formby, Preethi Srinivasan, Andrew M Leonard, Jonathan D Rogers, and Raheem A Beyah. 2016. Who’s in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems. In Proceedings of the Network and Distributed System Security Symposium. The Internet Society.
[24]
Marguerite Frank. 1981. The Braess Paradox. Mathematical Programming 20, 1 (1981), 283–302.
[25]
Luis Garcia, Ferdinand Brasser, Mehmet Hazar Cintuglu, Ahmad-Reza Sadeghi, Osama A Mohammed, and Saman A Zonouz. 2017. Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. In Proceedings of the Network and Distributed System Security Symposium. The Internet Society.
[26]
Hamid Reza Ghaeini, Daniele Antonioli, Ferdinand Brasser, Ahmad-Reza Sadeghi, and Nils Ole Tippenhauer. 2018. State-aware Anomaly Detection for Industrial Control Systems. In Proceedings of the Annual ACM Symposium on Applied Computing. 1620–1628.
[27]
J Duncan Glover, Mulukutla S Sarma, and Thomas Overbye. 2012. Power System Analysis & Design, SI version. Cengage Learning.
[28]
Niv Goldenberg and Avishai Wool. 2013. Accurate Modeling of Modbus/TCP for Intrusion Detection in SCADA Systems. International Journal of Critical Infrastructure Protection 6, 2(2013), 63–75.
[29]
András György and Levente Kocsis. 2011. Efficient Multi-start Strategies for Local Search Algorithms. Journal of Artificial Intelligence Research 41 (2011), 407–444.
[30]
Dina Hadžiosmanović, Robin Sommer, Emmanuele Zambon, and Pieter H Hartel. 2014. Through the Eye of the PLC: Semantic Security Monitoring for Industrial Processes. In Proceedings of the Annual Computer Security Applications Conference. 126–135.
[31]
James Halvorsen and Julian L Rrushi. 2017. Target Discovery Differentials for 0-Knowledge Detection of ICS Malware. In Proceedings of the Intl Conf on Dependable, Autonomic and Secure Computing. IEEE, 542–549.
[32]
Matthew Hausknecht and Peter Stone. 2015. Deep Recurrent Q-learning for Partially Observable MDPs. In Proceedings of AAAI Fall Symposium Series.
[33]
Bing Huang, Alvaro A Cardenas, and Ross Baldick. 2019. Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand Attacks. In Proceedings of the USENIX Security Symposium. 1115–1132.
[34]
Information Trust Institution. 2013. IEEE 14-Bus System. ITI Website. https://icseg.iti.illinois.edu/ieee-14-bus-system.
[35]
Grid Modernization Initiative. 2018. 2018 Grid Modernization Peer Review Report: Foundational Projects and Technical Area Portfolio Review. Technical Report. Department of Energy. https://www.energy.gov/sites/default/files/2019/12/f69/GMI-Peer-Review-Report-2018_FINAL.pdf.
[36]
Celine Irvene, Tohid Shekari, David Formby, and Raheem Beyah. 2019. If I Knew Then What I Know Now: On Reevaluating DNP3 Security using Power Substation Traffic. In Proceedings of the Annual Industrial Control System Security (ICSS) Workshop. 48–59.
[37]
Max Jaderberg, Valentin Dalibard, Simon Osindero, Wojciech M Czarnecki, Jeff Donahue, Ali Razavi, Oriol Vinyals, Tim Green, Iain Dunning, Karen Simonyan, 2017. Population based Training of Neural Networks. arXiv preprint arXiv:1711.09846(2017).
[38]
Mahdi Jamei, Anna Scaglione, Ciaran Roberts, Emma Stewart, Sean Peisert, Chuck McParland, and Alex McEachern. 2017. Anomaly Detection Using Optimally Placed μPMU Sensors in Distribution Grids. IEEE Transactions on Power Systems 33, 4 (2017), 3611–3623.
[39]
Leslie Pack Kaelbling, Michael L. Littman, and Anthony R. Cassandra. 1998. Planning and acting in partially observable stochastic domains. Artificial Intelligence 101, 1 (1998), 99–134.
[40]
Kaspersky. 2021. BlackEnergy APT Attacks in Ukraine. https://www.kaspersky.com/resource-center/threats/blackenergy.
[41]
Adrian Kelly, Aidan O’Sullivan, Patrick de Mars, and Antoine Marot. 2020. Reinforcement Learning for Electricity Network Operation. arXiv preprint arXiv:2003.07339(2020).
[42]
R James Ranjith Kumar and Biplab Sikdar. 2021. Detection of Stealthy Cyber-physical Line Disconnection Attacks in Smart Grid. IEEE Transactions on Smart Grid 12, 5 (2021), 4484–4493.
[43]
Mehmet Necip Kurt, Oyetunji Ogundijo, Chong Li, and Xiaodong Wang. 2018. Online Cyber-attack Detection in Smart Grid: A Reinforcement Learning Approach. IEEE Transactions on Smart Grid 10, 5 (2018), 5174–5185.
[44]
Matthew Landen. 2022. Dragon Hyperparameters. https://github.com/mlanden/Dragon-Hyperparameters.
[45]
Robert M Lee, MJ Assante, and T Conway. 2017. Crashoverride: Analysis of the threat to electric grid operations. Dragos Inc., March (2017).
[46]
Liam Li, Kevin Jamieson, Afshin Rostamizadeh, Ekaterina Gonina, Moritz Hardt, Ben Recht, and Ameet Talwalkar. 2018. A System for Massively Parallel Hyperparameter Tuning. arXiv preprint (2018).
[47]
Yao Liu, Peng Ning, and Michael K Reiter. 2011. False Data Injection Attacks against State Estimation in Electric Power Grids. Transactions on Information and System Security (TISSEC) 14, 1(2011), 1–33.
[48]
Jason Lu. 2020. Lujasone/ neurips_2020_l2rpn_comp_an_approach: The implementation of neurips_2020_l2rpn_track1 (robustness) and Track2 (adaptability) competition. https://github.com/lujasone/NeurIPS_2020_L2RPN_Comp_An_Approach.
[49]
Kang-Di Lu and Zheng-Guang Wu. 2021. Constrained-Differential-Evolution-Based Stealthy Sparse Cyber-Attack and Countermeasure in an AC Smart Grid. IEEE Transactions on Industrial Informatics 18, 8 (2021), 5275–5285.
[50]
Leandros A Maglaras and Jianmin Jiang. 2014. Intrusion Detection in SCADA Systems using Machine Learning Techniques. In Proceedings of the Science and Information Conference. IEEE, 626–631.
[51]
Leandros A Maglaras, Jianmin Jiang, and Tiago Cruz. 2014. Integrated OCSVM Mechanism for Intrusion Detection in SCADA systems. Electronics Letters 50, 25 (2014), 1935–1936.
[52]
Ajay Mandlekar, Yuke Zhu, Animesh Garg, Li Fei-Fei, and Silvio Savarese. 2017. Adversarially Robust Policy Learning: Active Construction of Physically-plausible Perturbations. In Proceedings of the International Conference on Intelligent Robots and Systems (IROS). IEEE, 3932–3939.
[53]
Antoine Marot, Benjamin Donnot, Gabriel Dulac-Arnold, Adrian Kelly, Aïdan O’Sullivan, Jan Viebahn, Mariette Awad, Isabelle Guyon, Patrick Panciatici, and Camilo Romero. 2021. Learning to run a Power Network Challenge: a Retrospective Analysis. arXiv preprint arXiv:2103.03104(2021).
[54]
Antoine Marot, Benjamin Donnot, Camilo Romero, Balthazar Donon, Marvin Lerousseau, Luca Veyrin-Forrer, and Isabelle Guyon. 2020. Learning to Run a Power Network Challenge for Training Topology controllers. Electric Power Systems Research 189 (2020), 106635.
[55]
A Marot, B Donnot, S Tazi, and P Panciatici. 2018. Expert System for Topological Remedial Action Discovery in Smart Grids. (2018).
[56]
Stephen E McLaughlin, Saman A Zonouz, Devin J Pohly, and Patrick D McDaniel. 2014. A Trusted Safety Verifier for Process Controller Code. In Proceedings of the Network and Distributed System Security Symposium, Vol. 14. The Internet Society.
[57]
MITRE. 2021. ATT&CK® for Industrial Control Systems. https://collaborate.mitre.org/attackics.
[58]
Volodymyr Mnih, Adria Puigdomenech Badia, Mehdi Mirza, Alex Graves, Timothy Lillicrap, Tim Harley, David Silver, and Koray Kavukcuoglu. 2016. Asynchronous Methods for Deep Reinforcement Learning. In Proceedings of the International Conference on Machine Learning. PMLR, 1928–1937.
[59]
Sean Monemi, Travon Dent, and Antonio Nunez. 2022. A Model of System Protection in IEEE 14-bus Power Grid. In 2022 IEEE International Conference in Power Engineering Application (ICPEA). 1–5. https://doi.org/10.1109/ICPEA53519.2022.9744697
[60]
Arun Nair, Praveen Srinivasan, Sam Blackwell, Cagdas Alcicek, Rory Fearon, Alessandro De Maria, Vedavyas Panneershelvam, Mustafa Suleyman, Charles Beattie, Stig Petersen, 2015. Massively Parallel Methods for Deep Reinforcement Learning. arXiv preprint arXiv:1507.04296(2015).
[61]
Thanh Thi Nguyen and Vijay Janapa Reddi. 2019. Deep reinforcement learning for cyber security. arXiv preprint arXiv:1906.05799(2019).
[62]
Loïc Omnes, Antoine Marot, and Benjamin Donnot. 2021. Adversarial Training for a Continuous Robustness Control Problem in Power Systems. In Proceedings of the IEEE Madrid PowerTech. IEEE, 1–6.
[63]
Palo Alto Networks. 2021. Next-Generation Firewalls. Palo Alto Networks website. https://www.paloaltonetworks.com/network-security/next-generation-firewall.
[64]
Shengyi Pan, Thomas Morris, and Uttam Adhikari. 2015. Developing a Hybrid Intrusion Detection System using Data Mining for Power Systems. IEEE Transactions on Smart Grid 6, 6 (2015), 3104–3113.
[65]
Paul W Parfomak. 2014. Physical Security of the US Power Grid: High-voltage Transformer Substations.
[66]
Colin Parris. [n. d.]. U.S. Department of Energy Recognizes GE’s Work with Digital Twins. https://www.ge.com/digital/blog/us-department-energy-recognizes-ges-work-digital-twins.
[67]
Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alché-Buc, E. Fox, and R. Garnett (Eds.). Curran Associates, Inc., 8024–8035. http://papers.neurips.cc/paper/9015-pytorch-an-imperative-style-high-performance-deep-learning-library.pdf
[68]
Stanislav Ponomarev. 2015. Intrusion Detection System of Industrial Control Networks using Network Telemetry. Louisiana Tech University.
[69]
Alexander J Ratner, Christopher M De Sa, Sen Wu, Daniel Selsam, and Christopher Ré. 2016. Data Programming: Creating Large Training Sets, Quickly. Advances in Neural Information Processing Systems 29 (2016).
[70]
Réseau de Transport d’Électricité. 2022. L2RPN Challenge. https://l2rpn.chalearn.org/.
[71]
Diaa Salman, Mehmet Kusaf, Yonis Khalif Elmi, and Ammar Almasri. 2022. Optimal Power Systems Planning for IEEE-14 Bus Test System Application. In 2022 10th International Conference on Smart Grid (icSmartGrid). 290–295. https://doi.org/10.1109/icSmartGrid55722.2022.9848574
[72]
Wei Shao and Vijay Vittal. 2005. Corrective Switching Algorithm for Relieving Overloads and Voltage Violations. IEEE Transactions on Power Systems 20, 4 (2005), 1877–1885.
[73]
Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, and Raheem Beyah. 2019. RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid. In Proceedings of the Network and Distributed System Security Symposium. The Internet Society.
[74]
Chetna Singh, Ashwin Nivangune, and Mrinal Patwardhan. 2016. Function Code based Vulnerability Analysis of DNP3. In Proceedings of the International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, 1–6.
[75]
Joe Slowik. 2019. Crashoverride: Reassessing the 2016 ukraine electric power event as a protection-focused attack. Dragos, Inc (2019).
[76]
Joe Slowik. 2020. Stuxnet to Crashoverride to Trisis: Evaluating the History and Future of Integrity-Based Attacks on Industrial Environments. https://www.dragos.com/resource/stuxnet-to-crashoverride-to-trisis-evaluating-the-history-and-future-of-integrity-based-attacks-on-industrial-environments/.
[77]
Saleh Soltan, Prateek Mittal, and H Vincent Poor. 2018. BlackIoT: IoT Botnet of High Wattage Devices can Disrupt the Power Grid. In Proceedings of the USENIX Security Symposium. 15–32.
[78]
Barnaby Stewart, Luis Rosa, Leandros A Maglaras, Tiago J Cruz, Mohamed Amine Ferrag, Paulo Simoes, and Helge Janicke. 2017. A Novel Intrusion Detection Mechanism for SCADA Systems which Automatically Adapts to Network Topology Changes. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 4, 10(2017).
[79]
Adam Stooke and Pieter Abbeel. 2018. Accelerated Methods for Deep Reinforcement Learning. arXiv preprint arXiv:1803.02811(2018).
[80]
Ruimin Sun, Alejandro Mera, Long Lu, and David Choffnes. 2021. SoK: Attacks on Industrial Control Logic and Formal Verification-based Defenses. In Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 385–402.
[81]
Richard S Sutton and Andrew G Barto. 2018. Reinforcement learning: An introduction. MIT press.
[82]
David I Urbina, Jairo A Giraldo, Alvaro A Cardenas, Nils Ole Tippenhauer, Junia Valente, Mustafa Faisal, Justin Ruths, Richard Candell, and Henrik Sandberg. 2016. Limiting the Impact of Stealthy Attacks on Industrial Control Systems. In Proceedings of the Conference on Computer and Communications Security. ACM, 1092–1105.
[83]
Alfonso Valdes and Steven Cheung. 2009. Communication Pattern Anomaly Detection in Process Control Systems. In Proceedings of the Conference on Technologies for Homeland Security. IEEE, 22–29.
[84]
Jorge Valenzuela, Jianhui Wang, and Nancy Bissinger. 2012. Real-time Intrusion Detection in Power System Operations. IEEE Transactions on Power Systems 28, 2 (2012), 1052–1062.
[85]
Hado Van Hasselt, Arthur Guez, and David Silver. 2016. Deep Reinforcement Learning with Double Q-learning. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 30.
[86]
Heidi Vella. 2014. Under threat: protecting substations and power lines from attack. https://www.power-technology.com/features/featureunder-threat-protecting-substations-and-power-lines-from-attack-4192867/.
[87]
David Wilson, Yufei Tang, Jun Yan, and Zhuo Lu. 2018. Deep Learning-aided Cyber-attack Detection in Power Transmission Systems. In Proceedings of the Power & Energy Society General Meeting (PESGM). IEEE, 1–5.
[88]
Allen J Wood, Bruce F Wollenberg, and Gerald B Sheblé. 2013. Power generation, operation, and control. John Wiley & Sons.
[89]
Xian Wu, Wenbo Guo, Hua Wei, and Xinyu Xing. 2021. Adversarial Policy Training against Deep Reinforcement Learning. In Proceedings of the USENIX Security Symposium.
[90]
Huan Yang, Liang Cheng, and Mooi Choo Chuah. 2018. Detecting Payload Attacks on Programmable Logic Controllers (PLCs). In Proceedings of the Conference on Communications and Network Security. IEEE, 1–9.
[91]
Yi Yang, Keiran McLaughlin, Sakir Sezer, Tim Littler, Eul Gyu Im, Bernardi Pranggono, and HF Wang. 2014. Multiattribute SCADA-specific Intrusion Detection System for Power Networks. IEEE Transactions on Power Delivery 29, 3 (2014), 1092–1102.
[92]
Jeong-Han Yun, Sung-Ho Jeon, Kyoung-Ho Kim, and Woo-Nyon Kim. 2013. Burst-based Anomaly Detection on the DNP3 Protocol. International Journal of Control and Automation 6, 2 (2013), 313–324.
[93]
Chiyuan Zhang, Oriol Vinyals, Remi Munos, and Samy Bengio. 2018. A Study on Overfitting in Deep Reinforcement Learning. arXiv preprint arXiv:1804.06893(2018).

Cited By

View all
  • (2024)Leveraging Deep Reinforcement Learning Technique for Intrusion Detection in SCADA InfrastructureIEEE Access10.1109/ACCESS.2024.339072212(63381-63399)Online publication date: 2024
  • (2023)SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP57164.2023.00042(592-614)Online publication date: Jul-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications Conference
December 2022
1021 pages
ISBN:9781450397599
DOI:10.1145/3564625
This work is licensed under a Creative Commons Attribution International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 December 2022

Check for updates

Author Tags

  1. cyberattack detection
  2. deep reinforcement leearning
  3. power grid reliability

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

ACSAC

Acceptance Rates

Overall Acceptance Rate 104 of 497 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)560
  • Downloads (Last 6 weeks)34
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Leveraging Deep Reinforcement Learning Technique for Intrusion Detection in SCADA InfrastructureIEEE Access10.1109/ACCESS.2024.339072212(63381-63399)Online publication date: 2024
  • (2023)SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP57164.2023.00042(592-614)Online publication date: Jul-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media