1. A Covert Electricity-Theft Cyberattack Against Machine Learning-Based Detection Models
- Author
-
Youyang Qu, Lei Guo, Yipeng Zhou, Longxiang Gao, Lei Cui, Borui Cai, and Shui Yu
- Subjects
Consumption (economics) ,Computer science ,business.industry ,Deep learning ,020208 electrical & electronic engineering ,Feature extraction ,02 engineering and technology ,Machine learning ,computer.software_genre ,Computer Science Applications ,Countermeasure ,Control and Systems Engineering ,Covert ,0202 electrical engineering, electronic engineering, information engineering ,Cyber-attack ,Electricity ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,computer ,Information Systems - Abstract
The advanced metering infrastructure (AMI) in modern networked smart homes brings various advantages. However, smart homes are vulnerable to many cyberattacks, and the most striking one is energy theft. Researchers have developed many countermeasures, fostered by advanced machine learning (ML) techniques. Nevertheless, recent advances are not robust enough in practice, partially due to the vulnerabilities of ML algorithms. In this paper, we present a covert electricity theft strategy through mimicking normal consumption patterns. Such attack is almost impossible to be detected by existing solutions as the manipulated data have little deviation against honest usage records. To address this threat, we initially identify and define two levels of consumption deviations: home-level and interpersonal-level, respectively. Then, we propose a feature extraction method and develop a novel detection model based on deep learning. Extensive experiments show that the presented attack could evade existing mainstream detectors and the proposed countermeasure outperforms existing leading methods.
- Published
- 2022
- Full Text
- View/download PDF