Skip to main content

Advances, Systems and Applications

Table 4 Sub-problems of Network Security

From: A Review of Intelligent Verification System for Distribution Automation Terminal based on Artificial Intelligence Algorithms

Sub-Problem

Description

Type of method

Status

Attack detecting

Replay attacks in attack detection exploit the system to accept previous communications without adequate security measures, which can lead to security breaches.

CNN

CDBN

[94, 95]

[96]

Security threat detection

Check and report potential vulnerabilities in the system.

Stacked Deep Polynomial Network

[97]

Malicious traffic detection

Detect malicious traffic in IoT networks and provide security as a service.

DBN

[98, 99]

Interval state estimation

Maximize the variation range of system variables.

SAE

[29]

Safety hazard prediction

Predict potential safety hazards that may arise in the system.

B-PDA

SAE

[100]

[101]

Electricity theft detection

Fraudulent electricity consumption reduces power supply quality, increases power generation load, leads to legitimate consumers paying excessive electricity bills, and affects the overall economy.

CNN + LSTM

CNN

Text CNN

LSTM-UNet-Adaboost

[102]

[103,104,105]

[106]

[107]

Identify non-technical power losses

Power loss is inherent in power transmission and distribution, but it will lead to lower power conversion efficiency.

CNN、LSTM、SAE

[30]

False data injection

FDI is an attack on Data integrity, which poses a serious threat to the SCADA system.

CDBN

MLP

AAE

GAN

[108]

[109]

[110]

[111]