Electricity Theft Detection for Smart Homes with Knowledge-Based Synthetic Attack Data

O. Abraham, H. Ochiai, Md. Delwar Hossain, Yuzo Taenaka, Y. Kadobayashi
{"title":"Electricity Theft Detection for Smart Homes with Knowledge-Based Synthetic Attack Data","authors":"O. Abraham, H. Ochiai, Md. Delwar Hossain, Yuzo Taenaka, Y. Kadobayashi","doi":"10.1109/WFCS57264.2023.10144120","DOIUrl":null,"url":null,"abstract":"Electricity thefts are conventionally manually detected by inspections, accusations, and the failure of meters. However, the recent evolution of machine learning may allow the automatic detection of electricity theft only from the patterns of meter readings. Electric consumption heavily relies on many factors, e.g., the lifestyle of the day and the weather, and thus the accuracy of detection is questioned. We propose an electricity theft detection framework for smart homes with knowledge-based synthetic attack data. This allows training of the attack classifier only from the legitimate power consumption data, i.e, without attack actions and associated labels. We identified five attack patterns as the knowledge which consisted of smart attacks and legacy attacks. We have conducted comprehensive evaluations with nine machine learning models using the Almanac of Minutely Power dataset version 2 (AMPds2) dataset fine-grained time-series data of a smart home. We found that Gradient Boosting-based algorithms achieved the best, and Random Forest performed alternatively with almost 100% accuracy for detecting and classifying legacy attacks. Some smart attacks were not detected, but those algorithms achieved good performance in detection and classification.","PeriodicalId":345607,"journal":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","volume":"27 11","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WFCS57264.2023.10144120","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Electricity thefts are conventionally manually detected by inspections, accusations, and the failure of meters. However, the recent evolution of machine learning may allow the automatic detection of electricity theft only from the patterns of meter readings. Electric consumption heavily relies on many factors, e.g., the lifestyle of the day and the weather, and thus the accuracy of detection is questioned. We propose an electricity theft detection framework for smart homes with knowledge-based synthetic attack data. This allows training of the attack classifier only from the legitimate power consumption data, i.e, without attack actions and associated labels. We identified five attack patterns as the knowledge which consisted of smart attacks and legacy attacks. We have conducted comprehensive evaluations with nine machine learning models using the Almanac of Minutely Power dataset version 2 (AMPds2) dataset fine-grained time-series data of a smart home. We found that Gradient Boosting-based algorithms achieved the best, and Random Forest performed alternatively with almost 100% accuracy for detecting and classifying legacy attacks. Some smart attacks were not detected, but those algorithms achieved good performance in detection and classification.
基于知识综合攻击数据的智能家居窃电检测
电力盗窃通常是通过检查、指控和仪表故障来手动检测的。然而,最近机器学习的发展可能只允许从电表读数模式自动检测电力盗窃。电力消耗严重依赖于许多因素,例如,一天的生活方式和天气,因此检测的准确性受到质疑。我们提出了一种基于知识的综合攻击数据的智能家居窃电检测框架。这允许仅从合法的功耗数据训练攻击分类器,也就是说,不需要攻击动作和相关标签。我们确定了五种攻击模式作为知识,包括智能攻击和遗留攻击。我们利用一个智能家居的细粒度时间序列数据集AMPds2 (Almanac of minetulypower dataset version 2)对9个机器学习模型进行了综合评估。我们发现基于梯度增强的算法达到了最好的效果,而随机森林在检测和分类遗留攻击方面的准确率几乎为100%。一些智能攻击没有被检测到,但这些算法在检测和分类方面取得了很好的效果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信