Anomaly Detection of Smart Grid Equipment Using Machine Learning Applications
Keywords:Anomaly, multivariate statistical analysis, principal component analysis, condition monitoring
Many application systems in today’s smart grid network comprise a variety of middleware components, such as vibrating or spinning electrical equipment, data bases, storage, caches, and identification services, among others. Each component is a discrete bundle of physical or virtual computers that will generate a large amount of data in the form of logs and metrics, and failure of these high-vibrating machines will result in the system’s entire shutdown. As a result, the condition monitoring system for this smart grid equipment is more dependable and efficient in predicting the machine’s health ahead of time. To analyze the data and derive any inferences for future analysis and anomaly detection, we’ll need a separate system, which will take longer to handle data given by each component and will demand additional processing resources. As a result, in this chapter, machine learning methods are used to identify abnormalities or condition monitoring for smart grid equipment and machines. Here, we used two separate methods: multivariate statistical analysis by calculating Mob distance and auto encoders, which is an artificial neural network approach. Furthermore, the findings demonstrate that these apps are effective in identifying anomaly ahead of time, i.e. before a few days.
Karishma Pawar and Vahida Attar, “Deep learning approaches for video-based anomalous activity detection”, World Wide Web, vol. 22.2, pp. 571–601, 2019.
Yuequan Bao et al., “Computer vision and deep learning-based data anomaly detection method for structural health monitoring”, Structural Health Monitoring, vol. 18.2, pp. 401–421, 2019.
Iqbal, A., Rajasekaran, A. S., Nikhil, G. S., and Azees, M. A Secure and Decentralized Blockchain Based EV Energy Trading Model Using Smart Contract in V2G Network. IEEE Access, 9, 75761–75777, 2021.
Rajasekaran, A. S., Azees, M., and Al-Turjman, F. A comprehensive survey on security issues in vehicle-to-grid networks. Journal of Control and Decision, 1–10, 2022.
Leman Akoglu, Hanghang Tong and Danai Koutra, “Graph based anomaly detection and description: a survey”, Data mining and knowledge discovery, vol. 29.3, pp. 626–688, 2015.
Arasan, A., Sadaiyandi, R., Al-Turjman, F., Rajasekaran, A. S., and Selvi Karuppuswamy, K. Computationally efficient and Secure Anonymous Authentication Scheme for Cloud Users. Personal and Ubiquitous Computing, Vol. 25, 2021.
J. Subramani, A. Maria, A. S. Rajasekaran and F. Al-Turjman, “Lightweight Privacy and Confidentiality Preserving Anonymous Authentication Scheme for WBANs,” in IEEE Transactions on Industrial Informatics, vol. 18, no. 5, pp. 3484–3491, May 2022.
Pang-Ning Tan, Michael Steinbach and Vipin Kumar, Introduction to data mining, Pearson Education India, 2016.
Xiuyao Song et al., “Conditional anomaly detection”, IEEE Transactions on knowledge and Data Engineering, vol. 19.5, pp. 631–645, 2017.
Nguyen Thanh Van and Tran Ngoc Thinh, “An anomaly-based network intrusion detection system using deep learning”, 2017 International Conference on System Science and Engineering (ICSSE). IEEE, 2017.
Sarah M. Erfani et al., “High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning”, Pattern Recognition, vol. 58, pp. 121–134, 2016.
Lorenzo Fernández Maimó et al., “A self-adaptive deep learning-based system for anomaly detection in 5G networks”, IEEE Access, vol. 6, pp. 7700–7712, 2018.
Ritesh K. Malaiya et al., “An empirical evaluation of deep learning for network anomaly detection”, 2018 International Conference on Computing Networking and Communications (ICNC). IEEE, 2018.
Zahra Jadidi et al., “Flow-based anomaly detection using neural network optimized with GSA algorithm”, 2013 IEEE 33rd international conference on distributed computing systems workshops. IEEE, 2013.