Pallab Ganguly, Sourav Dutta, M. Nasipuri, S. Tewari
{"title":"住宅用电中的建模欺诈","authors":"Pallab Ganguly, Sourav Dutta, M. Nasipuri, S. Tewari","doi":"10.1109/SEGE55279.2022.9889754","DOIUrl":null,"url":null,"abstract":"Understanding patterns of power usage is fundamental to the security goals of automation in the energy sector. Security aspects include data corruption via cyber-attacks, device tampering, or bypassing meter readings in energy theft. Although the mechanisms of abuse vary, persistent corruption generates patterns that statistically deviate from the designs of normal power usage. In this paper, we study power usage using both unsupervised and supervised techniques. The clustering algorithm creates energy profiles corresponding to a threat level hierarchy. We define a test in a proper statistical context by clearly specifying the fraud model (allowing simulation) to permit the analysis of the specificity and sensitivity of the model. The variance across meter readings changes over months, and the Gamma distribution fits nicely as a statistical model. Sensitivity analysis shows that detection accuracy is generally above 70% and identifies the threat level accurately. As expected, the accuracy varies over months and is lower during the months of summer. Detecting fraud in power usage is a significant problem and is an active area of research. It is essential to use the proper statistical measures to compare tests using diverse techniques.","PeriodicalId":338339,"journal":{"name":"2022 IEEE 10th International Conference on Smart Energy Grid Engineering (SEGE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Modeling Fraud in Residential Power Usage\",\"authors\":\"Pallab Ganguly, Sourav Dutta, M. Nasipuri, S. Tewari\",\"doi\":\"10.1109/SEGE55279.2022.9889754\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Understanding patterns of power usage is fundamental to the security goals of automation in the energy sector. Security aspects include data corruption via cyber-attacks, device tampering, or bypassing meter readings in energy theft. Although the mechanisms of abuse vary, persistent corruption generates patterns that statistically deviate from the designs of normal power usage. In this paper, we study power usage using both unsupervised and supervised techniques. The clustering algorithm creates energy profiles corresponding to a threat level hierarchy. We define a test in a proper statistical context by clearly specifying the fraud model (allowing simulation) to permit the analysis of the specificity and sensitivity of the model. The variance across meter readings changes over months, and the Gamma distribution fits nicely as a statistical model. Sensitivity analysis shows that detection accuracy is generally above 70% and identifies the threat level accurately. As expected, the accuracy varies over months and is lower during the months of summer. Detecting fraud in power usage is a significant problem and is an active area of research. It is essential to use the proper statistical measures to compare tests using diverse techniques.\",\"PeriodicalId\":338339,\"journal\":{\"name\":\"2022 IEEE 10th International Conference on Smart Energy Grid Engineering (SEGE)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 10th International Conference on Smart Energy Grid Engineering (SEGE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SEGE55279.2022.9889754\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 10th International Conference on Smart Energy Grid Engineering (SEGE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SEGE55279.2022.9889754","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Understanding patterns of power usage is fundamental to the security goals of automation in the energy sector. Security aspects include data corruption via cyber-attacks, device tampering, or bypassing meter readings in energy theft. Although the mechanisms of abuse vary, persistent corruption generates patterns that statistically deviate from the designs of normal power usage. In this paper, we study power usage using both unsupervised and supervised techniques. The clustering algorithm creates energy profiles corresponding to a threat level hierarchy. We define a test in a proper statistical context by clearly specifying the fraud model (allowing simulation) to permit the analysis of the specificity and sensitivity of the model. The variance across meter readings changes over months, and the Gamma distribution fits nicely as a statistical model. Sensitivity analysis shows that detection accuracy is generally above 70% and identifies the threat level accurately. As expected, the accuracy varies over months and is lower during the months of summer. Detecting fraud in power usage is a significant problem and is an active area of research. It is essential to use the proper statistical measures to compare tests using diverse techniques.