Elevating Cybersecurity for Smart Grid Systems—A Container-Based Approach Enhanced by Machine Learning
Abukeshek, Mays, Barakat, Basel and Ajayi, Bamidele (2024) Elevating Cybersecurity for Smart Grid Systems—A Container-Based Approach Enhanced by Machine Learning. In: 2024 29th International Conference on Automation and Computing (ICAC). IEEE, pp. 1-6. ISBN 979-8-3503-6088-2
Item Type: | Book Section |
---|
Abstract
This paper presents a comprehensive implementation of a cybersecurity solution for smart grid network containers. The methodology utilises (i) Qualys API-based vulnerability scanning and reporting system for vulnerability identification, (ii) Docker deployment for security and isolation, (iii) advanced load balancing techniques for resource optimisation, and (iv) machine learning-powered anomaly detection for threat identification and vulnerability prioritisation. The implementation was used to create a dataset that continues the details of several simulated attacks, enabling effective training and evaluation of a robust machine-learning model. The paper provides a thorough description of the implemented system architecture, the Qualys API-based vulnerability scanning and reporting system, the data set creation process, simulated attacks in Docker implementation, the load balancing process, and the machine learning model used for vulnerability prioritisation. The experiments showed that the machine learning model performed exceptionally well across all conducted attacks i.e., Denial of Service, Remote-to-Local, User-to-Root, and Probes, achieving high scores in accuracy, precision, recall, and F1 scores.
More Information
SWORD Depositor: Publication Router |
Depositing User: Publication Router |
Identifiers
Item ID: 18430 |
Identification Number: https://doi.org/10.1109/icac61394.2024.10718762 |
ISBN: 979-8-3503-6088-2 |
URI: http://sure.sunderland.ac.uk/id/eprint/18430 | Official URL: https://ieeexplore.ieee.org/document/10718762 |
Users with ORCIDS
Catalogue record
Date Deposited: 11 Nov 2024 09:15 |
Last Modified: 12 Nov 2024 15:50 |
Author: | Basel Barakat |
Author: | Mays Abukeshek |
Author: | Bamidele Ajayi |
University Divisions
Faculty of Technology > School of Computer ScienceSubjects
Computing > CybersecurityComputing
Actions (login required)
View Item (Repository Staff Only) |