Enhanced Hybrid ML Framework for Smart Grid Attack Detection

Authors

  • N.Harini Assistant Professor, Department of Computer Science and Engineering, Vignan’s Institute of Engineering for Women(A),Visakhapatnam,AP-530049, India. Author https://orcid.org/0009-0008-3480-1988
  • R.Susmitha B.Tech Students ,Department of Computer Science and Engineering, Vignan’s Institute of Engineering for Wom-en(A),Visakhapatnam,AP-530049, India Author https://orcid.org/0009-0001-5756-2683
  • T.Lavanya B.Tech Students ,Department of Computer Science and Engineering, Vignan’s Institute of Engineering for Wom-en(A),Visakhapatnam,AP-530049, India Author https://orcid.org/0009-0007-2350-2280
  • V.Triveni B.Tech Students ,Department of Computer Science and Engineering, Vignan’s Institute of Engineering for Wom-en(A),Visakhapatnam,AP-530049, India Author https://orcid.org/0009-0005-0730-5047
  • V.Divya Sree B.Tech Students ,Department of Computer Science and Engineering, Vignan’s Institute of Engineering for Wom-en(A),Visakhapatnam,AP-530049, India Author https://orcid.org/0009-0008-0017-682X
  • R.Gowthami B.Tech Students ,Department of Computer Science and Engineering, Vignan’s Institute of Engineering for Wom-en(A),Visakhapatnam,AP-530049, India Author https://orcid.org/0009-0007-1812-0886

DOI:

https://doi.org/10.70162/mijarcse/2025/v11/i1/v11i103

Keywords:

Smart Grid Security, Intrusion Detection, Machine Learning, Hybrid Model, Cyberattack Detection, Real-Time Monitoring.

Abstract

The increasing integration of information and communication technologies into smart grid infrastructures has significantly improved efficiency, automation, and reliability. However, this digital transformation has also introduced new vulnerabilities, making smart grids increasingly susceptible to sophisticated cyberattacks such as Denial-of-Service (DoS), false data injection, and replay attacks. This study aims to develop a robust, hybrid machine learning framework for intelligent intrusion detection in smart grids, addressing the limitations of existing single-model approaches in terms of generalization, real-time performance, and adaptability. The proposed framework combines three complementary models—Random Forest (RF) for static pattern classification, Long Short-Term Memory (LSTM) networks for temporal sequence modeling, and Autoencoders for unsupervised anomaly detection. Experiments were conducted on three benchmark datasets: NSL-KDD, CICIDS2017, and SWaT, covering both network-level and process-level cyberattacks. All models were trained under uniform preprocessing conditions, and their performances were evaluated using standard classification metrics and detection time analysis. The hybrid model achieved an accuracy of 96.42%, precision of 95.88%, recall of 95.55%, and F1-score of 95.71% on the NSL-KDD dataset, outperforming baseline models including SVM, RF, and LSTM. Average detection time was maintained between 4–5 ms/sample, validating its suitability for near real-time deployment. The results demonstrate the proposed framework’s effectiveness in enhancing cybersecurity for smart grids, offering a scalable, accurate, and computationally efficient solution for modern power systems.

References

A. Ghosh, T. Basu, and P. K. Das, “A comprehensive review on smart grid: Technology, challenges, and future prospects,” Energy Reports, vol. 8, pp. 3762–3783, 2022.

M. Erol-Kantarci and H. T. Mouftah, “Energy-efficient information and communication infrastructures in the smart grid: A survey on interactions and open issues,” IEEE Communications Surveys & Tutorials, vol. 17, no. 1, pp. 179–197, 2015.

H. Khurana, M. Hadley, N. Lu, and D. A. Frincke, “Smart-grid security issues,” IEEE Security & Privacy, vol. 8, no. 1, pp. 81–85, Jan.–Feb. 2010.

A. A. Cárdenas, S. Amin, and S. Sastry, “Research challenges for the security of control systems,” in Proc. 3rd USENIX Workshop on Hot Topics in Security (HotSec), San Jose, CA, USA, 2008, pp. 1–6.

Y. Mo et al., “Cyber–physical security of a smart grid infrastructure,” Proc. IEEE, vol. 100, no. 1, pp. 195–209, Jan. 2012.

K. Zhou, S. Yang, and Z. Shao, “Energy internet: The business perspective,” Applied Energy, vol. 178, pp. 212–222, 2016.

A. Hussain, V. N. Bakar, and H. A. B. Jalil, “Machine learning in smart grid: A review,” Renewable and Sustainable Energy Reviews, vol. 144, p. 111142, 2021.

S. Khan, S. Nazir, and J. H. Abawajy, “Machine learning-based intrusion detection for smart grid: A survey,” Journal of Network and Computer Applications, vol. 150, p. 102479, 2020.

M. A. Ferrag, L. Maglaras, and A. Derhab, “Deep learning approaches for cybersecurity in IoT: A review,” Journal of Network and Computer Applications, vol. 167, p. 102872, 2020.

X. Chen, J. Liu, and Y. Cheng, “Machine learning-based detection of false data injection attacks in smart grids,” International Journal of Electrical Power & Energy Systems, vol. 120, p. 105012, 2020.

L. Zhou, S. Yang, and H. Yu, “A deep learning-based method for detecting false data injection attacks in smart grids,” IEEE Access, vol. 7, pp. 128345–128353, 2019.

M. S. Hossain, G. Muhammad, and M. Guizani, “Explainable AI and mass surveillance system-based healthcare framework to combat COVID-I9 like pandemics,” IEEE Network, vol. 34, no. 4, pp. 126–132, July–Aug. 2020.

M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” in Proc. IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, 2009, pp. 1–6.

A. Hussain, V. N. Bakar, and H. A. B. Jalil, “Machine learning in smart grid: A review,” Renewable and Sustainable Energy Reviews, vol. 144, p. 111142, 2021.

R. Kumar and P. K. Suri, “An enhanced intrusion detection model using SVM and genetic algorithm for smart grid,” Sustainable Computing: Informatics and Systems, vol. 35, p. 100737, 2022.

Y. Lin, X. Li, and J. Zhou, “Detecting false data injection attacks in smart grid with stacked autoencoders,” Energy Reports, vol. 9, pp. 185–194, 2023.

W. Zhao, H. Zhang, and L. Yang, “Hybrid LSTM-CNN model for anomaly detection in SCADA networks,” Journal of Information Security and Applications, vol. 67, p. 103188, 2023.

M. A. Ferrag, L. Maglaras, and H. Janicke, “A federated learning approach for cyber intrusion detection in smart grids,” IEEE Internet of Things Journal, vol. 11, no. 2, pp. 1289–1301, 2024.

D. Singh and A. Thakur, “A robust ensemble model using Random Forest and XGBoost for intrusion detection in smart grid,” International Journal of Electrical Power & Energy Systems, vol. 151, p. 109007, 2023.

M. S. Hossain, G. Muhammad, and M. Guizani, “Deep reinforcement learning-based intrusion detection in smart grids,” IEEE Transactions on Industrial Informatics, vol. 18, no. 1, pp. 123–131, Jan. 2022.

J. Chen, Y. Liu, and Z. Li, “Graph neural network-based intrusion detection for smart grid communication networks,” Computer Networks, vol. 229, p. 109707, 2023.

https://www.unb.ca/cic/datasets/nsl.html

https://www.unb.ca/cic/datasets/ids-2017.html

https://itrust.sutd.edu.sg/datasets/swat/

B. Scholkopf, J. C. Platt, J. Shawe-Taylor, A. J. Smola, and R. C. Williamson,“Estimating the support of a high-dimensional distribution,” Neural Computation, vol. 13, no. 7, pp. 1443–1471, 2001.doi: 10.1162/089976601750264965

L. Breiman, “Random Forests,” Machine Learning, vol. 45, no. 1, pp. 5–32, 2001. doi: 10.1023/A:1010933404324

S. Hochreiter and J. Schmidhuber, “Long Short-Term Memory,” Neural Computation, vol. 9, no. 8, pp. 1735–1780, 1997. doi: 10.1162/neco.1997.9.8.1735

P. Baldi, “Autoencoders, unsupervised learning, and deep architectures,” in Proc. ICML Workshop on Unsupervised and Transfer Learning, Bellevue, WA, USA, 2012, pp. 37–49. Available: http://proceedings.mlr.press/v27/baldi12a.html

Naresh Kumar Bhagavatham et al., “Autonomic Resilience in Cybersecurity: Designing the Self-Healing Network Protocol for Next-Generation Software-Defined Networking,” International Journal of Computational and Experimental Science and Engineering, vol. 10, no. 4, Nov. 2024, doi: 10.22399/ijcesen.640.

B. D. D. . Nayomi, S. S. . Mallika, S. . T., J. . G., P. . Laxmikanth, and M. . Bhavsingh, “A Cloud-Assisted Framework Utilizing Blockchain, Machine Learning, and Artificial Intelligence to Countermeasure Phishing Attacks in Smart Cities”, Int J Intell Syst Appl Eng, vol. 12, no. 1s, pp. 313–327, Sep. 2023

L. P, V. V, M. M, P. Swetha, A. J, and B. M, “AquaPredict: Deploying Data-Driven Aquatic Models for Optimizing Sustainable Agriculture Practices,” International Journal of Electrical and Electronics Engineering, vol. 11, no. 6, pp. 76–90, Jun. 2024, doi: 10.14445/23488379/ijeee-v11i6p109.

K. V. Ramana, B. Ramesh, R. Changala, T. A. S. Srinivas, K. Praveen Kumar, and M. Bhavsingh, "Optimizing 6G Network Slicing with the EvoNetSlice Model for Dynamic Resource Allocation and Real-Time QoS Management," Int. Res. J. Multidiscip. Technovation, vol. 6, no. 4, pp. 325–340, 2024. doi: 10.54392/irjmt24324.

P. SumanPrakash et al., "Learning-driven Continuous Diagnostics and Mitigation Program for Secure Edge Management through Zero-Trust Architecture," Computer Communications, pp. 94–107, 2024. doi: 10.1016/j.comcom.2024.04.007.

U. V. Krishna, G. S. Rao, L. Addepalli, M. Bhavsingh, V. S. S. D., and L. M. Jaime, "Enhancing Airway Assessment with a Secure Hybrid Network-Blockchain System for CT & CBCT Image Evaluation," Int. Res. J. Multidiscip. Technovation, vol. 6, no. 2, pp. 45–60, 2024. doi: 10.54392/irjmt2425.

V. S. Saranya, G. Subbarao, D. Balakotaiah, and M. Bhavsingh, "Real-Time Traffic Flow Optimization using Adaptive IoT and Data Analytics: A Novel DeepStreamNet Model," Int. J. Adv. Res. Comput. Sci., vol. 15, no. 10, pp. 45–52, 2024.

K. V. Kumar Reddy, C. Madhava Rao, M. Archana, Z. Begum, M.Bhavsingh, and H. Ravikumar, “VisiDriveNet: A Deep Learning Model for Enhanced Autonomous Navigation in Urban Environments,” 2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 1294–1300, Oct. 2024, doi: 10.1109/i-smac61858.2024.10714627.

K. Dasari, M. A. Ali, S. N.B, K. D. Reddy, M. Bhavsingh, and K. Samunnisa, “A Novel IoT-Driven Model for Real-Time Urban Wildlife Health and Safety Monitoring in Smart Cities,” 2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 122–129, Oct. 2024, doi: 10.1109/i-smac61858.2024.10714601.

V. R. . K., H. K. . Yadav G., H. . Basha P., L. V. . Sambasivarao, 5Balarama K. . Rao Y. V., and M. . Bhavsingh, “Secure and Efficient Energy Trading using Homomorphic Encryption on the Green Trade Platform”, Int J Intell Syst Appl Eng, vol. 12, no. 1s, pp. 345–360, Sep. 2023.

P. Kumar, M. K. Gupta, C. R. S. Rao, M. Bhavsingh, and M. Srilakshmi, “A Comparative Analysis of Collaborative Filtering Similarity Measurements for Recommendation Systems,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 11, no. 3s, pp. 184–192, Mar. 2023, doi: 10.17762/ijritcc.v11i3s.6180.

M. S. Lakshmi, G. Rajavikram, V. Dattatreya, B. S. Jyothi, S. Patil, and M. Bhavsingh, "Evaluating the Isolation Forest Method for Anomaly Detection in Software-Defined Networking Security," Journal of Electrical Systems, vol. 19, no. 4, pp. 279–297, 2023. doi: 10.52783/jes.639.

E. V. N. Jyothi, G. S. Rao, D. S. Mani, C. Anusha, M. Harshini, M. Bhavsingh, and A. Lavanya, "A Graph Neural Network-Based Traffic Flow Prediction System with Enhanced Accuracy and Urban Efficiency," Journal of Electrical Systems, vol. 19, no. 4, pp. 336–349, 2023. doi: 10.52783/jes.642.

K. V. Ramana, A. Muralidhar, B. C. Balusa, M. Bhavsingh, and S. Majeti, “An Approach for Mining Top-k High Utility Item Sets (HUI),” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 11, no. 2s, pp. 198–203, Jan. 2023, doi: 10.17762/ijritcc.v11i2s.6045.

M. Jahir Pasha, M. Pingili, K. Sreenivasulu, M. Bhavsingh, S. I. Saheb, and A. Saleh, “Bug2 algorithm-based data fusion using mobile element for IoT-enabled wireless sensor networks,” Measurement: Sensors, vol. 24, p. 100548, Dec. 2022, doi: 10.1016/j.measen.2022.100548.

G. Ravikumar, Z. Begum, A. S. Kumar, V. Kiranmai, M. Bhavsingh, and O. K. Kumar, “Cloud Host Selection using Iterative Particle-Swarm Optimization for Dynamic Container Consolidation,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 10, no. 1s, pp. 247–253, Dec. 2022, doi: 10.17762/ijritcc.v10i1s.5846.

G. Yedukondalu, K. Samunnisa, M. Bhavsingh, I. S. Raghuram, and A. Lavanya, “MOCF: A Multi-Objective Clustering Framework using an Improved Particle Swarm Optimization Algorithm,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 10, no. 10, pp. 143–154, Oct. 2022, doi: 10.17762/ijritcc.v10i10.5743.

M. S. Lakshmi, K. S. Ramana, M. J. Pasha, K. Lakshmi, N. Parashuram, and M. Bhavsingh, “Minimizing the Localization Error in Wireless Sensor Networks Using Multi-Objective Optimization Techniques,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 10, no. 2s, pp. 306–312, Dec. 2022, doi: 10.17762/ijritcc.v10i2s.5948.

P. S. Prakash, M. Janardhan, K. Sreenivasulu, S. I. Saheb, S. Neeha, and M. Bhavsingh, “Mixed Linear Programming for Charging Vehicle Scheduling in Large-Scale Rechargeable WSNs,” Journal of Sensors, vol. 2022, pp. 1–13, Sep. 2022, doi: 10.1155/2022/8373343.

B. Swathi, S. Veerabomma, M. Archana, D. Bhadru, N. L. Somu, and M. Bhavsingh, “Edge-Centric IoT Health Monitoring: Optimizing Real-Time Responsiveness, Data Privacy, and Energy Efficiency,” 2025 6th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI), pp. 354–361, Jan. 2025, doi: 10.1109/icmcsi64620.2025.10883456.

Downloads

Published

2025-04-15

Issue

Section

Research Articles

How to Cite

[1]
N.Harini, R.Susmitha, T.Lavanya, V.Triveni, V.Divya Sree, and R.Gowthami, “Enhanced Hybrid ML Framework for Smart Grid Attack Detection”, Macaw Int. J. Adv. Res. Comput. Sci. Eng, vol. 11, no. 1, pp. 22–34, Apr. 2025, doi: 10.70162/mijarcse/2025/v11/i1/v11i103.

Share