Sayawu Yakubu Diaba, M. Shafie‐khah, M. Mekkanen, Tero Vartiainen, M. Elmusrati
{"title":"Risk Accessment of Machine Learning Algorithms on Manipulated Dataset in Power Systems","authors":"Sayawu Yakubu Diaba, M. Shafie‐khah, M. Mekkanen, Tero Vartiainen, M. Elmusrati","doi":"10.1109/FES57669.2023.10182751","DOIUrl":null,"url":null,"abstract":"The emergence of the communication infrastructure in power systems has increased the variety and sophistication of network assaults. Intrusion Detection Systems’ (IDS) importance has increased in relation to network security. IDS, however, is no longer secure when confronted with adversarial examples, and attackers can boost assault success rates by tricking the IDS. As a result, resilience must be increased. This paper assesses the Decision Tree, Logistic regression, Support Vector Machines (SVM), Naïve Bayes, K-Nearest Neighbours (KNN), and Ensemble’s effectiveness. Using the WUSTL-IIoT-2021 dataset and CIC-IDS2017 dataset, we train the algorithms on the unmanipulated dataset and then train the algorithms on the manipulated dataset. Per the simulation results, the accuracy and prediction speed drop on the manipulated dataset while the training time rises.","PeriodicalId":165790,"journal":{"name":"2023 International Conference on Future Energy Solutions (FES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Future Energy Solutions (FES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FES57669.2023.10182751","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The emergence of the communication infrastructure in power systems has increased the variety and sophistication of network assaults. Intrusion Detection Systems’ (IDS) importance has increased in relation to network security. IDS, however, is no longer secure when confronted with adversarial examples, and attackers can boost assault success rates by tricking the IDS. As a result, resilience must be increased. This paper assesses the Decision Tree, Logistic regression, Support Vector Machines (SVM), Naïve Bayes, K-Nearest Neighbours (KNN), and Ensemble’s effectiveness. Using the WUSTL-IIoT-2021 dataset and CIC-IDS2017 dataset, we train the algorithms on the unmanipulated dataset and then train the algorithms on the manipulated dataset. Per the simulation results, the accuracy and prediction speed drop on the manipulated dataset while the training time rises.