Venkatasamy Thiruppathy Kesavan, Gopi Ramasamy, Md. Jakir Hossen, Emerson Raja Joseph
{"title":"WH-XGBoosting: A Multi-Stage Intrusion Detection Framework for Securing Communication in Electric Vehicle Smart Grid Networks","authors":"Venkatasamy Thiruppathy Kesavan, Gopi Ramasamy, Md. Jakir Hossen, Emerson Raja Joseph","doi":"10.1049/cmu2.70097","DOIUrl":null,"url":null,"abstract":"<p>Electric vehicles (EVs) are mostly linked with the smart grids that cause diverse cyberattacks such as denial of services (DoS), data manipulations and network intrusions, which affect the grid ecosystem's reliability, efficiency and security. The multi-stage intrusion detection framework is created to explore the various resources, power consumption metrics, and network traffic to identify and mitigate cyberattacks. The adoption of EVs in grid systems creates dynamic security issues and complexity while exchanging information. The research difficulties are addressed by developing the whale-optimised XGBoosting machine learning (WH-XGBoosting), which can identify and mitigate the threats by attaining scalability and low latency. The framework uses diverse features and segmentation procedures to reduce redundancy and overfitting issues. In addition, the whale optimisation process selects optimised values and hyperparameters that improve the detection rate. Then, a boosting algorithm is applied to classify the incoming data, with a minimum false positive rate and maximum detection rate. The framework uses the whale optimisation process to select the optimized features and classifier hyperparameter updating process that enhance the overall intrusion detection accuracy. The discussed system collects the input from CICEVSE2024 and processes it using high-level feature analysis, which helps predict the intruder with a maximum recognition rate (99.12%) compared to existing methods. The system ensures robust, reliable, and scalable solutions for various cyber threats in grid ecosystems.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6000,"publicationDate":"2025-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70097","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Communications","FirstCategoryId":"94","ListUrlMain":"https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/cmu2.70097","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
Electric vehicles (EVs) are mostly linked with the smart grids that cause diverse cyberattacks such as denial of services (DoS), data manipulations and network intrusions, which affect the grid ecosystem's reliability, efficiency and security. The multi-stage intrusion detection framework is created to explore the various resources, power consumption metrics, and network traffic to identify and mitigate cyberattacks. The adoption of EVs in grid systems creates dynamic security issues and complexity while exchanging information. The research difficulties are addressed by developing the whale-optimised XGBoosting machine learning (WH-XGBoosting), which can identify and mitigate the threats by attaining scalability and low latency. The framework uses diverse features and segmentation procedures to reduce redundancy and overfitting issues. In addition, the whale optimisation process selects optimised values and hyperparameters that improve the detection rate. Then, a boosting algorithm is applied to classify the incoming data, with a minimum false positive rate and maximum detection rate. The framework uses the whale optimisation process to select the optimized features and classifier hyperparameter updating process that enhance the overall intrusion detection accuracy. The discussed system collects the input from CICEVSE2024 and processes it using high-level feature analysis, which helps predict the intruder with a maximum recognition rate (99.12%) compared to existing methods. The system ensures robust, reliable, and scalable solutions for various cyber threats in grid ecosystems.
期刊介绍:
IET Communications covers the fundamental and generic research for a better understanding of communication technologies to harness the signals for better performing communication systems using various wired and/or wireless media. This Journal is particularly interested in research papers reporting novel solutions to the dominating problems of noise, interference, timing and errors for reduction systems deficiencies such as wasting scarce resources such as spectra, energy and bandwidth.
Topics include, but are not limited to:
Coding and Communication Theory;
Modulation and Signal Design;
Wired, Wireless and Optical Communication;
Communication System
Special Issues. Current Call for Papers:
Cognitive and AI-enabled Wireless and Mobile - https://digital-library.theiet.org/files/IET_COM_CFP_CAWM.pdf
UAV-Enabled Mobile Edge Computing - https://digital-library.theiet.org/files/IET_COM_CFP_UAV.pdf