WH-XGBoosting: A Multi-Stage Intrusion Detection Framework for Securing Communication in Electric Vehicle Smart Grid Networks

IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC
Venkatasamy Thiruppathy Kesavan, Gopi Ramasamy, Md. Jakir Hossen, Emerson Raja Joseph
{"title":"WH-XGBoosting: A Multi-Stage Intrusion Detection Framework for Securing Communication in Electric Vehicle Smart Grid Networks","authors":"Venkatasamy Thiruppathy Kesavan,&nbsp;Gopi Ramasamy,&nbsp;Md. Jakir Hossen,&nbsp;Emerson Raja Joseph","doi":"10.1049/cmu2.70097","DOIUrl":null,"url":null,"abstract":"<p>Electric vehicles (EVs) are mostly linked with the smart grids that cause diverse cyberattacks such as denial of services (DoS), data manipulations and network intrusions, which affect the grid ecosystem's reliability, efficiency and security. The multi-stage intrusion detection framework is created to explore the various resources, power consumption metrics, and network traffic to identify and mitigate cyberattacks. The adoption of EVs in grid systems creates dynamic security issues and complexity while exchanging information. The research difficulties are addressed by developing the whale-optimised XGBoosting machine learning (WH-XGBoosting), which can identify and mitigate the threats by attaining scalability and low latency. The framework uses diverse features and segmentation procedures to reduce redundancy and overfitting issues. In addition, the whale optimisation process selects optimised values and hyperparameters that improve the detection rate. Then, a boosting algorithm is applied to classify the incoming data, with a minimum false positive rate and maximum detection rate. The framework uses the whale optimisation process to select the optimized features and classifier hyperparameter updating process that enhance the overall intrusion detection accuracy. The discussed system collects the input from CICEVSE2024 and processes it using high-level feature analysis, which helps predict the intruder with a maximum recognition rate (99.12%) compared to existing methods. The system ensures robust, reliable, and scalable solutions for various cyber threats in grid ecosystems.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6000,"publicationDate":"2025-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70097","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Communications","FirstCategoryId":"94","ListUrlMain":"https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/cmu2.70097","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Electric vehicles (EVs) are mostly linked with the smart grids that cause diverse cyberattacks such as denial of services (DoS), data manipulations and network intrusions, which affect the grid ecosystem's reliability, efficiency and security. The multi-stage intrusion detection framework is created to explore the various resources, power consumption metrics, and network traffic to identify and mitigate cyberattacks. The adoption of EVs in grid systems creates dynamic security issues and complexity while exchanging information. The research difficulties are addressed by developing the whale-optimised XGBoosting machine learning (WH-XGBoosting), which can identify and mitigate the threats by attaining scalability and low latency. The framework uses diverse features and segmentation procedures to reduce redundancy and overfitting issues. In addition, the whale optimisation process selects optimised values and hyperparameters that improve the detection rate. Then, a boosting algorithm is applied to classify the incoming data, with a minimum false positive rate and maximum detection rate. The framework uses the whale optimisation process to select the optimized features and classifier hyperparameter updating process that enhance the overall intrusion detection accuracy. The discussed system collects the input from CICEVSE2024 and processes it using high-level feature analysis, which helps predict the intruder with a maximum recognition rate (99.12%) compared to existing methods. The system ensures robust, reliable, and scalable solutions for various cyber threats in grid ecosystems.

Abstract Image

WH-XGBoosting:电动汽车智能电网通信安全的多阶段入侵检测框架
电动汽车大多与智能电网相连,智能电网会引发各种网络攻击,如拒绝服务(DoS)、数据操纵和网络入侵,影响电网生态系统的可靠性、效率和安全性。创建了多阶段入侵检测框架,以探索各种资源,功耗指标和网络流量,以识别和减轻网络攻击。在电网系统中采用电动汽车会在交换信息时产生动态安全问题和复杂性。通过开发鲸鱼优化的XGBoosting机器学习(WH-XGBoosting)来解决研究困难,该机器学习可以通过实现可扩展性和低延迟来识别和减轻威胁。该框架使用不同的特征和分割过程来减少冗余和过拟合问题。此外,鲸鱼优化过程选择优化值和超参数,以提高检测率。然后,采用增强算法对输入数据进行分类,使误报率最小,检测率最大。该框架使用鲸鱼优化过程选择优化特征和分类器超参数更新过程来提高整体入侵检测的准确性。所讨论的系统从CICEVSE2024中收集输入,并使用高级特征分析对其进行处理,与现有方法相比,该方法有助于以最高的识别率(99.12%)预测入侵者。该系统确保了电网生态系统中各种网络威胁的鲁棒性、可靠性和可扩展性解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IET Communications
IET Communications 工程技术-工程:电子与电气
CiteScore
4.30
自引率
6.20%
发文量
220
审稿时长
5.9 months
期刊介绍: IET Communications covers the fundamental and generic research for a better understanding of communication technologies to harness the signals for better performing communication systems using various wired and/or wireless media. This Journal is particularly interested in research papers reporting novel solutions to the dominating problems of noise, interference, timing and errors for reduction systems deficiencies such as wasting scarce resources such as spectra, energy and bandwidth. Topics include, but are not limited to: Coding and Communication Theory; Modulation and Signal Design; Wired, Wireless and Optical Communication; Communication System Special Issues. Current Call for Papers: Cognitive and AI-enabled Wireless and Mobile - https://digital-library.theiet.org/files/IET_COM_CFP_CAWM.pdf UAV-Enabled Mobile Edge Computing - https://digital-library.theiet.org/files/IET_COM_CFP_UAV.pdf
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信