Lightweight Data-Driven Anomaly Detection for IoT-Based Smart Grids: Capabilities and Limitations
dc.contributor.author | Eskilson, Lisa | |
dc.contributor.author | Lager Carvalho, Alexander | |
dc.contributor.department | Chalmers tekniska högskola / Institutionen för data och informationsteknik | sv |
dc.contributor.department | Chalmers University of Technology / Department of Computer Science and Engineering | en |
dc.contributor.examiner | Duvignau, Romaric | |
dc.contributor.supervisor | Almgren, Magnus | |
dc.date.accessioned | 2024-11-15T08:38:38Z | |
dc.date.available | 2024-11-15T08:38:38Z | |
dc.date.issued | 2024 | |
dc.date.submitted | ||
dc.description.abstract | The integration of Internet of Things devices in critical infrastructure, such as the smart grid, has made it possible to monitor and manage energy distribution with increased efficiency. However, as these devices become more complex and interconnected, detecting physical tampering or data manipulation by malicious actors, such as the Sandworm attack in Ukraine, becomes increasingly challenging. One way that has shown promise in addressing this problem is the use of lightweight data-driven anomaly detection techniques. In this thesis, PASAD and USAD, two state-of-the-art lightweight data-driven anomaly detection algorithms were selected and evaluated using a series of experiments simulating common attacks against smart grids as suggested by relevant research. These experiments aimed to investigate the viability of these algorithms in IoT-based smart grids. More specifically, the experiments include two different attack areas, namely OT- and network-level attacks, which were crafted by manipulating real smart grid operational data. These experiments were evaluated using time series-aware metrics to get a fair assessment of the efficacy of the algorithms. The results from the experiments were used to evaluate the viability of lightweight data-driven anomaly detection algorithms and their capabilities and limitations were highlighted. Furthermore, the knowledge acquired from executing the experiments was used to propose guidelines for the development of an event management system that handles alerts produced by different models to provide valuable and actionable information to the OT operator. The selected algorithms were successful in detecting various long-duration attacks with stealth characteristics, while other, shorter and more direct attacks, were significantly harder to detect. Despite this, these lightweight data-driven anomaly detection algorithms proved to be a good fit for the experiments evaluated in this thesis. | |
dc.identifier.coursecode | DATX05 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12380/308984 | |
dc.language.iso | eng | |
dc.setspec.uppsok | Technology | |
dc.subject | Lightweight Anomaly Detection | |
dc.subject | Machine Learning | |
dc.subject | Internet of Things | |
dc.subject | Smart Grid | |
dc.title | Lightweight Data-Driven Anomaly Detection for IoT-Based Smart Grids: Capabilities and Limitations | |
dc.type.degree | Examensarbete för masterexamen | sv |
dc.type.degree | Master's Thesis | en |
dc.type.uppsok | H | |
local.programme | Computer systems and networks (MPCSN), MSc |