How effective are synthetic attack models to detect real-world energy theft?

<p>Advanced Metering Infrastructure plays a significant role in smart grid systems by enabling efficient two-way communication between energy suppliers and consumers. Despite its benefits, AMI faces numerous security challenges, including vulnerabilities to cyberattacks and non-technical losse...

Full description

Saved in:
Bibliographic Details
Main Author: Emran Altamimi (21397883) (author)
Other Authors: Abdulaziz Al-Ali (16393288) (author), Abdulla K. Al-Ali (22928911) (author), Hussein Aly (18877555) (author), Qutaibah M. Malluhi (14151912) (author)
Published: 2025
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:<p>Advanced Metering Infrastructure plays a significant role in smart grid systems by enabling efficient two-way communication between energy suppliers and consumers. Despite its benefits, AMI faces numerous security challenges, including vulnerabilities to cyberattacks and non-technical losses, potentially leading to substantial revenue losses. Data-driven approaches to electricity fraud detection have gained popularity due to smart grids’ big data. However, available datasets lack annotated real anomalies, which poses significant challenges in developing effective detection systems. As a response, researchers have developed synthetic attack models to simulate real-world theft. In this paper, we analyze the validity of popular synthetic attack models and their limitations in representing real-world theft scenarios. By conducting an empirical evaluation of synthetic attacks, we provide a practical assessment of their efficacy and their correlation with one another. Our findings suggest that while these models perform well when tested on synthetic attacks, their performance considerably deteriorates on real-world theft, considering the only real-world public dataset. Furthermore, some attack model pairs were found to be more correlated than others. Consequently, this paper suggests a sufficient subset of synthetic attacks for training and testing to effectively capture the full set of synthetic attacks.</p><h2>Other Information</h2> <p> Published in: Energy<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.energy.2025.137763" target="_blank">https://dx.doi.org/10.1016/j.energy.2025.137763</a></p>