Volume 15 , Issue 2 , PP: 195-207, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Mounir Mohammad Abou-Elasaad 1 * , Samir G. Sayed 2 , Mohamed M. El-Dakroury 3
Smart grids (SGs) are integral to modern utility systems, managing power generation, energy consumption, and communication networks. However, as these systems become increasingly interconnected, they are exposed to sophisticated cyber threats that can compromise their functionality and security. To address these challenges, this paper presents an AI-driven detection framework designed to significantly enhance cybersecurity in smart grids. The proposed system combining Recurrent Neural Networks (RNNs) with Support vector classifier to improve detection accuracy, recognition capabilities, and system robustness. The methodology comprises four main stages: (1) data preprocessing to ensure high-quality input for analysis, (2) traffic detection using RNNs to capture temporal patterns, (3) classification of traffic as normal or abnormal via support vector classifier (SVC), and (4) identification of specific attack types through another SVC for refined threat categorization. This integrated approach enables real-time detection of both known and emerging threats, focusing on minimizing false positives and maximizing detection precision. The system was evaluated on three comprehensive benchmark datasets: UNSW_NB15 and BoT-IoT, achieving an average accuracy of 100%. These results underscore the superiority of this AI-based solution over traditional intrusion detection systems, providing a robust and scalable framework for securing smart grids and other critical infrastructures.
Smart Grid , Cyber-Attacks , Vulnerabilities , Artificial Intelligence , Detection Method , Advanced Technologies
[1] Muneeswari, G., Rose, R. M., Balaganesh, S., Prasath, G. J., & Chellam, S., Mitigation of attack detection via multi-stage cyber intelligence technique in smart grid. Measurement: Sensors, 33, 101077, 2024.
[2] Bouramdane, A. A., Cyberattacks in smart grids: Challenges and solving the multi-criteria decision-making for cybersecurity options, including ones that incorporate artificial intelligence, using an analytical hierarchy process. Journal of Cybersecurity and Privacy, 3(4), 662-705, 2023.
[3] Beg, O. A., Khan, A. A., Rehman, W. U., & Hassan, A. A review of AI-based cyber-attack detection and mitigation in microgrids. Energies, 16(22), 7644, 2023.
[4] Mazhar, T., Irfan, H. M., Khan, S., Haq, I., Ullah, I., Iqbal, M., & Hamam, H. Analysis of cyber security attacks and its solutions for the smart grid using machine learning and blockchain methods. Future Internet, 15(2), 83, 2023.
[5] Alsuwian, T., Butt, A. S., & Amin, A. A., Smart grid cyber security enhancement: Challenges and solutions—A review. Sustainability, 14(21), 14226, 2022.
[6] Koduru, S., Machina, V. S. P., & Madichetty, S., Cyber-attacks in cyber-physical microgrid systems: A comprehensive review. Energies, 16(12), 4573, 2023.
[7] Berman, D. S., et al. A survey of deep learning methods for cyber security. Information, 10(4), 122, 2019.
[8] Li, J. H. Cyber security meets artificial intelligence: a survey. Frontiers of Information Technology & Electronic Engineering, 19(12), 1462-1474, 2018.
[9] Stein, G., Chen, B., Wu, A. S., & Hua, K. Decision tree classifier for network intrusion detection with GA-based feature selection. In Proceedings of the 43rd annual Southeast regional conference—Volume 2 (pp. 136-141), 2005.
[10] Sanghavi, P., Solanki, R., Parmar, V., & Shah, K. Comprehensive study of cyber security in AI-based smart grid. In International Conference on Advances in Computing and Data Sciences, Cham: Springer Nature Switzerland, pp. 189-202, Apr. 2023.
[11] Salem, A. H., Azzam, S. M., Emam, O. E., & Abohany, A. A. Advancing cybersecurity: A comprehensive review of AI-driven detection techniques. Journal of Big Data, 11(1), 105, 2024.
[12] Dangi, A. K., Pant, K., Alanya-Beltran, J., Chakraborty, N., Akram, S. V., & Balakrishna, K. A review of use of artificial intelligence on cyber security and the fifth-generation cyber-attacks and its analysis. In 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), pp. 553-557, 2023.
[13] Nishat, F. Artificial intelligence-enabled anomaly IDS for IoT network: Trends, solutions, and challenges. In Artificial Intelligence for Intelligent Systems, CRC Press, pp. 190-202, 2025.
[14] Achaal, B., Adda, M., Berger, M., Ibrahim, H., & Awde, A. Study of smart grid cyber security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. Cybersecurity, 7(1), 10, 2024.
[15] Guato Burgos, M. F., Morato, J., & Vizcaino Imacaña, F. P. A review of smart grid anomaly detection approaches pertaining to artificial intelligence. Appl. Sci., 14, 1194, 2024.
[16] Ajala, O. A., Okoye, C. C., Ofodile, O. C., Arinze, C. A., & Daraojimba, O. D. Review of AI and machine learning applications to predict and thwart cyber-attacks in real-time. Magna Sci. Adv. Res. Rev., 10(1), 312-320, 2024.
[17] Guato Burgos, M. F., Morato, J., & Vizcaino Imacaña, F. P. A review of smart grid anomaly detection approaches pertaining to artificial intelligence. Appl. Sci., 14(3), 1194, 2024
[18] Saxena, K., Jeyakarthika, K., Dhaaraani, R., Goshwami, S., Raj, K. B., Rani, K. S., & Vyas, V. Enhancing cybersecurity in smart grids through machine learning-based intrusion detection systems. J. Electr. Syst., 20(7s), 2524-2533, 2024.
[19] Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor, 17(4), 2347–2376, 2015.
[20] Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. Edge computing: Vision and challenges. IEEE Internet Things J., 3(5), 637–646, 2016.
[21] Xu, L. D., He, W., & Li, S. Internet of things in industries: A survey. IEEE Trans. Ind. Inform., 10(4), 2233–2243, 2018.
[22] Scarfone, K., & Mell, P. Guide to intrusion detection and prevention systems (IDPS). Natl. Inst. Stand. Technol., NIST Spec. Publ. 800-94, 2007.
[23] Buczak, A. L., & Guven, E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor, 18(2), 1153–1176, 2015.
[24] Patcha, A., & Park, J.-M. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Netw. 51 (12), 3448–3470, 2007.
[25] Almomani, O. A feature selection model for network intrusion detection system based on PSO, GWO, FFA, and GA algorithms. Symmetry, 12(6), 1046, June 2020.
[26] Nazir, A., & Khan, R. A. A novel combinatorial optimization-based feature selection method for network intrusion detection. Comput. Secur. 102, 102164, March 2021.
[27] Kasongo, S. An advanced intrusion detection system for IIoT based on GA and tree-based algorithms. IEEE Access, 9, 113199–212, August 2021.
[28] Gaber, T., Awotunde, J., Folorunso, S., Ajagbe, S., & Eldesouky, E. Industrial internet of things intrusion detection method using machine learning and optimization techniques. Wireless Commun. Mobile Comput, 2023(1), 3939895, 2023.
[29] Jeffrey, N., Tan, Q., & Villar, J. Using ensemble learning for anomaly detection in cyber–physical systems. Electron, 13(7), 1391, April 2024.
[30] Wu, P., Guo, H., & Moustafa, N. PELICAN: A deep residual network for network intrusion detection. In Proc. 50th Annu. IEEE/IFIP Int. Conf. Dependable Syst. Netw. Workshops (DSN-W), June 2020, pp. 55–62.
[31] Krichen, M. Strengthening the security of smart contracts through the power of artificial intelligence. Comput, 12(5), 107, 2023.
[32] Shahin, M., Maghanaki, M., Hosseinzadeh, A., & Chen, F. F. Advancing network security in industrial IoT: A deep dive into AI-enabled intrusion detection systems. Adv. Eng. Inform, 62, 102685, 2024.
[33] Peterson, J. M., Leevy, J. L., & Khoshgoftaar, T. M. A review and analysis of the bot-IoT dataset. In 2021 IEEE International Conference on Service-Oriented System Engineering (SOSE) (pp. 20-27), August 2021.
[34] Moustafa, N. A new distributed architecture for evaluating AI-based security systems at the edge: network ToN_IoT datasets. Sustainable Cities and Society, 72, 2021. Doi: 10.1016/j.scs.2021.102994.
[35] Smys, S., Chen, J. I. Z., & Shakya, S. Survey on neural network architectures with deep learning. J. Soft Comput. Paradigm, 2(3), 186–194, 2020.
[36] Wang, F., & Tax, D. M. Survey on the attention based RNN model and its applications in computer vision. ArXiv preprint arXiv: 1601.06823, 2016.
[37] Moustafa, N., & Slay, J. UNSWNB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In Proc. IEEE Military Commun. Inf. Syst. Conf. (MilCIS), pp. 1–6, 2015.