10 Intrusion Detection For Cybersecurity of Smart Meters
10 Intrusion Detection For Cybersecurity of Smart Meters
1, JANUARY 2021
Abstract—The integration of Information and hardware (e.g., smart meters and grid routers). Compared
Communications Technology (ICT) enables real-time com- to conventional electric energy meters, such as mechanical
munication for smart meters to participate in power system meters and Automatic Meter Reading (AMR) meters, smart
operations. However, Advanced Metering Infrastructures (AMI)
are vulnerable to cyber attacks. Both utilities and power meters are equipped with a two-way communication mod-
consumers may become victims of cyber intrusions. In this ule to exchange data (e.g., customer’s information, power
paper, a two-stage cyber intrusion protection system is proposed. readings, and control commands) between customers and
At the first stage of intrusion detection, a Support Vector a utility. Based on the real-time data acquisition and control
Machine (SVM) is used as a detection algorithm to discover capability, AMI facilitates power flow reading, load forecast-
suspicious behaviors inside a smart meter. At the second stage,
the Temporal Failure Propagation Graph (TFPG) technique ing, demand response, outage management, system monitor-
is used to generate attack routes for identifying attack events. ing, and dynamic pricing programs. However, cyber-physical
Finally, the proposed pattern recognition algorithm is used to system (CPS) security has become a significant concern to
calculate the similarity between a detected abnormal event and the smart grid infrastructure, as well as AMI devices. In 2015
pre-defined cyber attacks. A higher similarity value implies and 2016, cyber attacks on the Ukrainian power grid [1], [2]
a higher chance that a smart meter is under attack. An
AMI security test platform has been developed to: (1) Collect have demonstrated that power grids are vulnerable to cyber
training/testing data for SVM, (2) Simulate and analyze cyber intrusions.
attack events, and (3) Validate the proposed cyber attack Cyber security of the AMI network is widely recognized
protection system. The test platform consists of Network- as a critical issue [3]–[6]. For power consumers, data pri-
Simulator 3 (NS-3) software to simulate an AMI network vacy is a primary concern as current meters are upgraded
environment and single board computers (SBCs) to emulate
the IEEE 802.15.4 communication between a grid router and to smart meters [7]. To guarantee the confidentiality of data,
a smart meter. a new communication protocol has been proposed [8]. In [9],
an encryption scheme has been developed for AMI network
Index Terms—Advanced metering infrastructure (AMI), smart
meters, cyber-physical system security, intrusion detection. messages with minimal computation and communication over-
heads in encryption and decryption operations. For utilities,
data integrity and availability attacks can threaten the quality
I. I NTRODUCTION of power grid services and revenues. To prevent energy theft,
MART grid technologies have been deployed to enable various studies have proposed different detection algorithms by
S the new functions and services, improving the reliabil-
ity, security, and efficiency of a power system. Metering
analyzing historical and present consumption data [10]–[12].
Reference [13] discusses energy theft through the pricing
infrastructure plays a significant role between power sup- system. It is aimed at a long term detection technique to
ply and demand ends. To upgrade the service quality and capture anomaly pricing events. Due to vulnerabilities of
provide new services, many utilities adopt AMI components wireless communication and physical devices, meter tamper-
including software (e.g., meter data management system) and ing is one of the potential attacks. In [14], a collaborative
intrusion detection mechanism is proposed to detect False
Manuscript received October 20, 2019; revised March 8, 2020 and June Data Injection (FDI) attacks. The work of [15] introduces
21, 2020; accepted July 6, 2020. Date of publication July 20, 2020; date a specification-based intrusion detection system for advanced
of current version December 21, 2020. This work was supported in part
by the Department of Energy under Award DE-OE0000780; and in part metering infrastructures. Any sequence of operations executed
by National Science Foundation under Award ECCS-1824577. Paper no. outside the system’s specifications is considered a security
TSG-01577-2019. (Corresponding author: Chih-Che Sun.) violation. To develop a comprehensive solution, the authors
Chih-Che Sun, D. Jonathan Sebastian Cardenas, and Adam Hahn are with
the School of Electrical Engineering and Computer Science, Washington of [16] propose an IDS architecture which covers the entire
State University, Pullman, WA 99164 USA (e-mail: [email protected]; AMI network, including AMI headend (e.g., meter data man-
[email protected]; [email protected]). agement system), grid router, and smart meters. Machine
Chen-Ching Liu is with the Power and Energy Center, Virginia Polytechnic
Institute and State University, Blacksburg, VA 24061 USA, and also with the Learning (ML) based detection algorithms can handle multiple
School of Electrical Engineering and Computer Science, Washington State attack types.
University, Pullman, WA 99164 USA (e-mail: [email protected]). This paper proposes an IDS that includes two detection
Color versions of one or more of the figures in this article are available
online at https://ieeexplore.ieee.org. processes for smart meters to identify malicious behaviors
Digital Object Identifier 10.1109/TSG.2020.3010230 which are intentionally driven by humans. In comparison with
1949-3053
c 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Universidad del Valle. Downloaded on September 17,2025 at 19:58:58 UTC from IEEE Xplore. Restrictions apply.
SUN et al.: INTRUSION DETECTION FOR CYBERSECURITY OF SMART METERS 613
Authorized licensed use limited to: Universidad del Valle. Downloaded on September 17,2025 at 19:58:58 UTC from IEEE Xplore. Restrictions apply.
614 IEEE TRANSACTIONS ON SMART GRID, VOL. 12, NO. 1, JANUARY 2021
Authorized licensed use limited to: Universidad del Valle. Downloaded on September 17,2025 at 19:58:58 UTC from IEEE Xplore. Restrictions apply.
SUN et al.: INTRUSION DETECTION FOR CYBERSECURITY OF SMART METERS 615
Fig. 4. Kernel values of (a) a local kernel function (RBF) and (b) a global
kernel function (Polynomial).
Fig. 3. Structure of the proposed intrusion detection system for smart meters.
Authorized licensed use limited to: Universidad del Valle. Downloaded on September 17,2025 at 19:58:58 UTC from IEEE Xplore. Restrictions apply.
616 IEEE TRANSACTIONS ON SMART GRID, VOL. 12, NO. 1, JANUARY 2021
TABLE I
A BNORMAL E VENTS FOR S MART M ETERS IN TFPG M ODEL
Authorized licensed use limited to: Universidad del Valle. Downloaded on September 17,2025 at 19:58:58 UTC from IEEE Xplore. Restrictions apply.
SUN et al.: INTRUSION DETECTION FOR CYBERSECURITY OF SMART METERS 617
TABLE II
ATTACK ROUTE S ET G ENERATED FOR S MART M ETERS
Algorithm 1 Wagner-Fischer Algorithm
Input: a = a0 , a1 , . . . , am and b = b0 , b1 , . . . , bn
Output: Edit Distance (ED)
1: // Using Eq (5) and Eq (6) to fill the first row and first column.
2: for i= 0 to m do
3: di0 = i;
4: end for
5: for j= 0 to n do
6: d0j = j;
7: end for
8: //Using Eq (7) to fill the matrix other than the first row and
column.
calculation is done by the Wagner-Fischer algorithm [25]. The 9: for i = 1 to m do
ED is defined as the minimum number of edit operations that 10: for j = 1 to n do
match one pattern to another. In this paper, the edit operations 11: if (ai = bj )
include (i) Wdel : delete a single symbol, (ii) Wins : insert a sin- 12: dij = di−1, j−1 ;
13: elseif (ai−1 ai = bj bj−1 )
gle symbol, and (iii) Wtrans : transposition of two successive 14: dij = di−2,j−2 + 1;
symbols. Each operation is counted as a unit cost by giving 15: else
Wdel = Wins = Wtrans = 1. The calculation process is based 16: dij = min{di−1,j + 1, di,j−1 + 1};
on the observation between all prefixes of the first pattern a as 17: end if
well as the second pattern b, where the lengths are m and n, 18: end for
19: end for
respectively. A matrix is created to hold each edit distance of 20: // Using Eq (8) to obtain the edit distance
prefixes of two patterns. All the values in the matrix are filled 21: Edit Distance (ED) = dmn ;
by repeating the observation between prefixes of two patterns.
Then, the last computed distance, dmn , is the distance (ED)
between two full strings. In [26], the computation of the edit
distance between two finite strings, “a” and “b”, is defined as
“traces”. A trace, Ta,b , from sequence a to b, is a sequence
of ordered pairs of integers (i, j) that satisfy:
1) 1 ≤ i ≤ m and 1 ≤ j ≤ n, where m and n are lengths of
string a and b, respectively.
2) Any of two pairs (i1 , j1 ) and (i2 , j2 ) in Ta,b , (a) i1 = i2 ,
j1 = j2 ; (b) ii < i2 iff j1 < j2 .
Take two strings “Ryan” and “Ray” as an example. A person
can easily match Ryan to Ray in two steps: (1) delete “n”
Fig. 6. Computing distances with matrix by Wagner-Fischer algorithm.
and (2) swap “y” and “a.” In this case, the edit distance is 2.
However, computers need to execute a series of comparison
processes from left to right, character by character. First, the abnormal behaviors is detected in an FDI attack. Due to non-
prefixes for two strings are: {R}, {Ry}, {Rya}, {Ryan}, and ideal factors, there exist missing or mistaken reports in the
{R}, {Ra}, {Ray}. Then, the entire comparison step is listed abnormal event sequence. In the example in Fig. 6, the IDS
as follows: ({R},{R}), ({R},{Ra}), ({R},{Ray}), ({Ry},{R}), fails to capture event “e” and is mistaken in the sequence
({Ry},{Ra}), ({Ry},{Ray}), · · · , ({Ryan},{Ray}). Therefore, of events “b” and “c.” Thus, the IDS calculates the similar-
all pairs of prefixes are compared to obtain the edit distance ity between “acbf” (detected event) and the attack path P2 in
of the two strings. The calculation for the matrix elements can Table II. The elements in the first row and column are decided
be formulated as: by (5) and (6), respectively. Then, the rest of the blanks can be
i calculated by (7). Once the last element (corner at the bottom
di0 = Wins (ak ) for 1 ≤ i ≤ m (5) right) is filled, the ED between two patterns is obtained.
k=1 Using the pattern recognition algorithm, the detected abnor-
j
mal event is compared with each pre-defined cyber attack in
d0j = Wdel (bk ) for 1 ≤ j ≤ n (6) the dictionary (TABLE II) and obtained a ED value. Among
⎧k=1 all four calculated ED values (ED1 , ED2 , . . . , ED4 ) according
⎪
⎪di−1,j−1 , if ai = bj to the attack paths (P1 , P2 , . . . , P4 ), the least edit opera-
⎨
di−2,j−2 +Wtrans bj−1 , bj , if ai−1 ai tion is considered the most likely attack type. Then, an attack
dij =
⎪
⎪ = bj bj−1 similarity index, IDSind , is defined as:
⎩
min di−1,j + Wins (ai ), di,j−1 + Wdel bj , otherwise
EDi
(7) IDSind = max 1 − (9)
Length(Pi )
ED = dmn (8)
where i = {1, 2, 3, 4}. Once IDSind is greater than a user-
Fig. 6 demonstrates how to calculate the edit distance by defined threshold value Vth , the detected event is regarded
using Wagner-Fischer algorithm. Assuming a sequence of as an intrusion event. Otherwise, it requests another round
Authorized licensed use limited to: Universidad del Valle. Downloaded on September 17,2025 at 19:58:58 UTC from IEEE Xplore. Restrictions apply.
618 IEEE TRANSACTIONS ON SMART GRID, VOL. 12, NO. 1, JANUARY 2021
Authorized licensed use limited to: Universidad del Valle. Downloaded on September 17,2025 at 19:58:58 UTC from IEEE Xplore. Restrictions apply.
SUN et al.: INTRUSION DETECTION FOR CYBERSECURITY OF SMART METERS 619
TABLE V
I NPUT F EATURES FOR T RAINING AND T ESTING P ROCEDURES
Authorized licensed use limited to: Universidad del Valle. Downloaded on September 17,2025 at 19:58:58 UTC from IEEE Xplore. Restrictions apply.
620 IEEE TRANSACTIONS ON SMART GRID, VOL. 12, NO. 1, JANUARY 2021
TABLE VII
The pre-trained SVM model has a size of 353 Kbytes, and P ERFORMANCE C OMPARISON OF SVM M ODELS FOR S MART M ETER ADS
the throughput of the communication channel is assumed to
be 200 Kbps. As a result, it takes 14.12 seconds for the
data to travel from the grid router to a smart meter. Since
each smart meter sends measurements every 20 minutes, the
sending cycle will be set to 1200 seconds. Based on (10),
the SVM data-transfer introduces a small overhead (∼1.18%),
indicating that the proposed SVM-based IDS has a low impact
on the operation of an AMI network.
Authorized licensed use limited to: Universidad del Valle. Downloaded on September 17,2025 at 19:58:58 UTC from IEEE Xplore. Restrictions apply.
SUN et al.: INTRUSION DETECTION FOR CYBERSECURITY OF SMART METERS 621
TABLE IX
T EST R ESULTS OF P ROPOSED IDS stage intrusion detection process is activated. According to the
predefined attack routes, which are based on the TFPG tech-
nique, the pattern recognition algorithm is able to calculate
the similarity index, indicating the likelihood of an intrusion
event as well as the attack type.
An AMI test platform has been developed to provide
a co-simulation environment, including emulating wireless
communication between a smart meter and a grid router,
simulating cyber attacks, collecting training/testing data, and
validating the proposed detection system. In this work, the
simulated 5 NANs are identical; however, this does not limit
the AMI network simulation applicability. Users can apply
different network topologies and bridge NANs with phys-
E. Validation of the Proposed IDS ical devices according to their needs. Since the proposed
Since the SVM provides high accuracy in the first stage SVM-based detection system only requires local NAN data to
detection process, the abnormal behaviors trigger the alarm classify normal versus abnormal data, it can be claimed that
in all the three test cases. Once ADSind is changed from 0 each NAN can operate in a parallel manner with respect to
to 1, the IDS starts to collect the time information of detected other NANs by only using a limited amount of computing
abnormal behaviors for the second stage detection process. power, O(nsv ). Therefore, the proposed intrusion detection
The test results are provided in Table IX. method is able to scale across multiple NANs as long as the
In Case 1, the IDS fails to detect abnormal event “j” which computing requirements of each NAN are met.
shows an abnormal temperature of CPU. The sequence of The simulation results show that the SVM classifier exhibits
detected abnormal behaviors is aligned along the time axis as good performance with kernel functions in the specific cate-
“abcegik.” The proposed pattern matching algorithm obtains gory. Compared to NN algorithms, SVM has an advantage
IDSind by finding the maximal similarity between the detected in the shorter training time. This feature allows the proposed
sequence and the pre-defined attack sequences. In this test SVM model to be frequently updated to maintain a high level
scenario, the length of P4 is 8, and the corresponding ED4 of detection accuracy. In the three test attack scenarios, the
is 1. ML-based detection algorithm identifies abnormal behaviors
Therefore, IDSind is calculated as 0.875 by (9), which is and triggers the next stage detection process to investigate the
the greatest value among all four attack paths. It indicates that sequence of the detected abnormal behaviors. The results show
the series of suspicious behaviors intends to launch a CPU that all test scenarios are recognized by the IDS successfully.
overloading attack. Since IDSind is greater than the threshold, To improve the detection accuracy of the SVM, more fea-
i.e., Vth = 0.6, this event is judged to be an attack. In Case 2, tures to represent physical system behaviors can be added
attackers do not physically access the target, and there is not an into the dataset, e.g., power measurement readings from
abnormal report from the shaking sensor. The detected abnor- feeders and neighboring meters. In this work, a star-like
mal event sequence is “bcghk.” The path P3 generates the communication topology is used in the NS-3 simulator to eval-
largest similarity index IDSind . The detection system reports uate the network performance after integrating the proposed
this attack event as a RAM exhaustion attack. In the last test IDS. Future research needs to be conducted to incorporate
case, Case 3, the target meter receives a couple of packets from other AMI network topologies, a task required for simulation
an unknown source address during testing of PANID. This of large-scale AMI networks.
behavior is recognized as the connection attempting. During
the attack stage, the communication channel is congested. In ACKNOWLEDGEMENT
this attack event, only “b” and “d” are captured by the IDS. The authors greatly appreciate the reviewers for the valuable
IDSind is 0.667, indicating that a DoS attack is recognized. comments that are incorporated in the revision.
Although the event “c” is missing in the attack sequence, the
IDS can still identify the cyber attack and the attack type.
R EFERENCES
[1] Analysis of the Cyber Attack on the Ukrainian Power Grid,
VI. C ONCLUSION SANS and Electricity Information Sharing and Analysis
The growing number of smart meters on the customer side Center (E-ISAC), Washington, DC, USA, Mar. 2016. [Online].
Available: http://www.nerc.com/pa/CI/ESISAC/Documents/E-
raised cyber security concerns about potential vulnerabilities ISAC_SANS_Ukraine_DUC_18Mar2016.pdf
of the new technologies. It is shown that intruders can launch [2] Analysis of the Threat to Electric Grid Operations, Dragos Inc., Hanover,
a cyber attack by utilizing the vulnerability of hardware com- MD, USA, Jun. 2017. [Online]. Available: https://dragos.com/wp-
content/uploads/CrashOverride-01.pdf
ponents and communication systems of smart meters. This [3] C. C. Sun, A. Hahn, and C. C. Liu, “Cyber security of a power grid:
paper proposes an IDS with the two-stage collaborative detec- State-of-the-art,” Int. J. Elect. Power Energy Systs., vol. 99, pp. 45–56,
tion process for smart meters. The SVM classifier is applied Jan. 2018.
[4] Q. Sun et al., “A comprehensive review of smart energy meters in
as the abnormal behavior detection mechanism in the first intelligent energy networks,” IEEE Internet Things J., vol. 3, no. 4,
stage. As soon as a suspicious behavior is detected, the second pp. 464–479, Aug. 2016.
Authorized licensed use limited to: Universidad del Valle. Downloaded on September 17,2025 at 19:58:58 UTC from IEEE Xplore. Restrictions apply.
622 IEEE TRANSACTIONS ON SMART GRID, VOL. 12, NO. 1, JANUARY 2021
[5] Y. Liu, S. Hu, and A. Y. Zomaya, “The hierarchical smart home [29] G. Creech and J. Hu, The ADFA Intrusion Detection Datasets. Accessed:
cyberattack detection considering power overloading and frequency dis- Jul. 29, 2020. [Online]. Available: https://www.unsw.adfa.edu.au/unsw-
turbance,” IEEE Trans. Ind. Informat., vol. 12, no. 5, pp. 1973–1983, canberra-cyber/cybersecurity/ADFA-IDS-Datasets/
Oct. 2016. [30] C.-C. Sun, J. Hong, and C.-C. Liu, “A co-simulation environment
[6] K. I. Sgouras, A. N. Kyriakidis, and D. P. Labridis, “Short-term risk for integrated cyber and power systems,” in Proc. IEEE Int. Conf.
assessment of botnet attacks on advanced metering infrastructure,” IET Smart Grid Commun. (SmartGridComm), Miami, FL, USA, 2015,
Cyber Phys. Syst. Theory Appl., vol. 2, no. 3, pp. 143–151, Oct. 2017. pp. 133–138.
[7] S. Finster and I. Baumgart, “Privacy-aware smart metering: A sur- [31] N. Wells, BusyBox: A Swiss Army Knife for Linux, JSLinux,
vey,” IEEE Commun. Surveys Tuts., vol. 17, no. 2, pp. 1088–1101, San Francisco, CA, USA, Nov. 2000. [Online]. Available:
2nd Quart., 2015. http://busybox.net/
[8] Y. Yan, R. Q. Hu, S. K. Das, H. Sharif, and Y. Qian, “An efficient [32] F. Pedregosa et al., “Scikit-learn: Machine learning in python,” J. Mach.
security protocol for advanced metering infrastructure in smart grid,” Learn. Res., vol. 12, pp. 2825–2830, Feb. 2011.
IEEE Netw., vol. 27, no. 4, pp. 64–71, Jul./Aug. 2013.
[9] A. Alsharif, M. Nabil, M. M. E. A. Mahmoud, and M. Abdallah,
“EPDA: Efficient and privacy-preserving data collection and access con-
trol scheme for multi-recipient AMI networks,” IEEE Access, vol. 7,
pp. 27829–27845, 2019.
[10] P. Jokar, N. Arianpoo, and V. C. M. Leung, “Electricity theft detection in Chih-Che Sun (Member, IEEE) received the
AMI using customers’ consumption patterns,” IEEE Trans. Smart Grid, Ph.D. degree from the Department of Electrical
vol. 7, no. 1, pp. 216–226, Jan. 2016. Engineering and Computer Science, Washington
[11] Y. Liu and S. Hu, “Cyberthreat analysis and detection for energy theft State University, Pullman, WA, USA, in 2019.
in social networking of smart homes,” IEEE Trans. Comput. Soc. Syst., He is currently a Postdoctoral Research Staff
vol. 2, no. 4, pp. 148–158, Dec. 2015. with Lawrence Livermore National Laboratory,
[12] S. McLaughlin, B. Holbert, A. Fawaz, R. Berthier, and S. Zonouz, Livermore, CA, USA. His research interests include
“A multi-sensor energy theft detection framework for advanced meter- cyber-physical systems security, and modeling and
ing infrastructures,” IEEE J. Sel. Areas Commun., vol. 31, no. 7, simulation.
pp. 1319–1330, Jul. 2013.
[13] Y. Liu, S. Hu, and T. Ho, “Leveraging strategic detection techniques for
smart home pricing cyberattacks,” IEEE Trans. Depend. Secure Comput.,
vol. 13, no. 2, pp. 220–235, Apr. 2016.
[14] X. Liu, P. Zhu, Y. Zhang, and K. Chen, “A collaborative intrusion detec-
tion mechanism against false data injection attack in advanced metering D. Jonathan Sebastian Cardenas (Member,
infrastructure,” IEEE Trans. Smart Grid, vol. 6, no. 5, pp. 2435–2443, IEEE) received the B.E. and M.Sc. degrees in electri-
Sep. 2015. cal engineering from Instituto Politécnico Nacional,
[15] R. Berthier and W. H. Sanders, “Specification-based intrusion detection Mexico City, Mexico, in 2013 and 2015, respec-
for advanced metering infrastructures,” in Proc. IEEE 17th Pac. Rim Int. tively. He is currently pursuing the Ph.D. degree in
Symp. Depend. Comput. (PRDC), Pasadena, CA, USA, pp. 184–193, computer science with Washington State University,
Dec. 2011. Pullman, WA, USA.
[16] M. A. Faisal, Z. Aung, J. R. Williams, and A. Sanchez, “Data-stream- Within the professional field, he has collaborated
based intrusion detection system for advanced metering infrastructure in in the development of training simulators and mar-
smart grid: A feasibility study,” IEEE Syst. J., vol. 9, no. 1, pp. 31–44, ket analysis tools that are in use by the industry.
Mar. 2015. His current research interests include cybersecurity
[17] R. Ullah, Y. Faheem, and B. Kim, “Energy and congestion-aware routing of cyber-physical systems and data privacy with an emphasis towards IoTs
metric for smart grid AMI networks in smart city,” IEEE Access, vol. 5, and IBRs.
pp. 13799–13810, 2017.
[18] W. Stallings and L. Brown, “Computer security concepts” in Computer
Security Principles and Practice, 2nd ed. London, U.K.: Pearson, 2012,
ch. 1, sec. 1, pp. 10–17.
[19] L. Liang, Q. Wang, and Y. Chen, “Application of support vector machine Adam Hahn (Member, IEEE) received the M.S.
in online monitoring of wastewater treatment based on combined kernel and Ph.D. degrees from the Department of Electrical
functions,” in Proc. Intel. Conf. Elect. Control Eng., Yichang, China, and Computer Engineering, Iowa State University
2011, pp. 3840–3843. in 2006 and 2013, respectively. He was worked as
[20] J. Zhang, “A complete list of kernels used in support vector machines,” a Senior Information Security Engineer with the
Biochem. Pharmacol. Open Access, vol. 4, no. 5, p. 195, Oct. 2015. MITRE Corporation. He is an Assistant Professor
[21] V. L. Brailovsky, O. Barzilay, and R. Shahave, “On global, local, with the Department of Electrical Engineering and
mixed and neighborhood kernels for support vector machines,” Pattern Computer Science, Washington State University. His
Recognit. Lett., vol. 20, nos. 11–13, pp. 1183–1190, 1999. research interests include cybersecurity of the smart
[22] S. Abdelwahed, G. Karsai, N. Mahadevan, and S.C. Ofsthun, “Practical grid and cyber-physical systems, including intrusion
implementation of diagnosis systems using timed failure propagation detection, risk modeling, vulnerability assessment,
graph models,” IEEE Trans. Instrum. Meas., vol. 58, no. 2, pp. 240–247, and secure system architectures.
Feb. 2009.
[23] T. Okuda, E. Tanaka, and T. Kasai, “A method for the correction of
garbled words based on the levenshtein metric,” IEEE Trans. Comput.,
vol. C-25, no. 2, pp. 172–178, Feb. 1976.
[24] N. D. L. R. K. Chaurasiya and S. Ghosh, “A novel weighted edit
distance-based spelling correction approach for improving the reliability Chen-Ching Liu (Life Fellow, IEEE) received the
of Devanagari script-based P300 speller system,” IEEE Access, vol. 4, Ph.D. degree from the University of California,
pp. 8184–8198, 2016. Berkeley, CA, USA. He is currently an American
[25] W. Masek and M. A. Paterson, “Faster algorithm computing string edit Electric Power Professor and the Director of
distances,” Comput. Syst. Sci., vol. 20, pp. 18–31, Feb. 1980. the Power and Energy Center, Virginia Tech,
[26] R. A. Wagner and M. J. Fischer, “The string-to-string correction Blacksburg, VA, USA. He was the Chair of
problem,” J. Assoc. Comput. Mach., vol. 21, no. 1, pp. 168–173, 1974. IEEE PES Technical Committee on Power System
[27] The KDD99 Dataset. Accessed: Jul. 29, 2020. [Online]. Available: Analysis, Computing, and Economics. He is the
http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html U.S. Member of CIGRE Study Committee D2,
[28] DARPA Intrusion Detection Data Sets, I. S. T. G. MIT Information Systems, and Telecommunication. He
Lincoln Lab, Lexington, MA, USA, 1998. [Online]. Available: is a Member of the U.S. National Academy of
http://www.ll.mit.edu/mission/communications/ Engineering.
Authorized licensed use limited to: Universidad del Valle. Downloaded on September 17,2025 at 19:58:58 UTC from IEEE Xplore. Restrictions apply.