Abstract
Smart grid technology has transformed electricity distribution and management, but it also exposes critical infrastructures to cybersecurity threats. To mitigate these risks, the integration of machine learning (ML) and natural language processing (NLP) techniques has emerged as a promising approach. This survey paper analyses current research and applications related to ML and NLP integration, exploring methods for risk assessment, log analysis, threat analysis, intrusion detection, and anomaly detection. It also explores challenges, potential opportunities, and future research directions for enhancing smart grid cybersecurity through the synergy of ML and NLP. The study's key contributions include providing a thorough understanding of state-of-the-art techniques and paving the way for more robust and resilient smart grid defences against cyber threats.
References
P. U. Rao, B. Sodhi, and R. Sodhi, “Cyber Security Enhancement of Smart Grids Via Machine Learning - A Review,” in 2020 21st National Power Systems Conference (NPSC), 2020, pp. 1–6. doi: 10.1109/NPSC49263.2020.9331859.
S. Sahoo, T. Dragicevic, and F. Blaabjerg, “Cyber security in control of grid-tied power electronic converters - Challenges and vulnerabilities,” IEEE J Emerg Sel Top Power Electron, vol. 9, no. 5, pp. 5326–5340, Oct. 2021, doi: 10.1109/JESTPE.2019.2953480.
Rahul Kumar Jha, “Cybersecurity and Confidentiality in Smart Grid for Enhancing Sustainability and Reliability,” Recent Research Reviews Journal, vol. 2, no. 2, pp. 215–241, Dec. 2023, doi: 10.36548/rrrj.2023.2.001.
L. Shi, Q. Dai, and Y. Ni, “Cyber–physical interactions in power systems: A review of models, methods, and applications,” Electric Power Systems Research, vol. 163, pp. 396–412, 2018, doi: https://doi.org/10.1016/j.epsr.2018.07.015.
Thammachantuek, S. Kosolsomnbat, and M. Ketcham, “Comparison of Machine Learning Algorithm’s Performance Based on Decision making in Autonomous Car,” in 2018 International Joint Symposium on Artificial Intelligence and Natural Language Processing (iSAI-NLP), 2018, pp. 1–6. doi: 10.1109/iSAI-NLP.2018.8693002.
R. Sabillon, J. Serra-Ruiz, V. Cavaller, and J. Cano, “A Comprehensive Cybersecurity Audit Model to Improve Cybersecurity Assurance: The CyberSecurity Audit Model (CSAM),” in 2017 International Conference on Information Systems and Computer Science (INCISCOS), 2017, pp. 253–259. doi: 10.1109/INCISCOS.2017.20.
M. Ghiasi, Z. Wang, T. Niknam, M. Dehghani, and H. R. Ansari, “Cyber-Physical Security in Smart Power Systems from a Resilience Perspective: Concepts and Possible Solutions,” in Power Systems Cybersecurity: Methods, Concepts, and Best Practices, H. Haes Alhelou, N. Hatziargyriou, and Z. Y. Dong, Eds., Cham: Springer International Publishing, 2023, pp. 67–89. doi: 10.1007/978-3-031-20360-2_3.
L. Li, S. Huang, Z. Ouyang, and N. Li, “A Deep Learning Framework for Non-stationary Time Series Prediction,” in 2022 3rd International Conference on Computer Vision, Image and Deep Learning & International Conference on Computer Engineering and Applications (CVIDL & ICCEA), 2022, pp. 339–342. doi: 10.1109/CVIDLICCEA56201.2022.9824863.
H. Zhang, J. Li, Z. Qi, A. Aronsson, J. Bosch, and H. H. Olsson, “Deep Reinforcement Learning for Multiple Agents in a Decentralized Architecture: A Case Study in the Telecommunication Domain,” in 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), 2023, pp. 183–186. doi: 10.1109/ICSA-C57050.2023.00048.
H. Isahara, “Resource-based Natural Language Processing,” in 2007 International Conference on Natural Language Processing and Knowledge Engineering, 2007, pp. 11–12. doi: 10.1109/NLPKE.2007.4368002.
A.Rawat, H. Maheshwari, M. Khanduja, R. Kumar, M. Memoria, and S. Kumar, “Sentiment Analysis of Covid19 Vaccines Tweets Using NLP and Machine Learning Classifiers,” in 2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON), 2022, pp. 225–230. doi: 10.1109/COM-IT-CON54601.2022.9850629.
Y. Cai, E. Zhang, Y. Qi, and L. Lu, “A Review of Research on the Application of Deep Reinforcement Learning in Unmanned Aerial Vehicle Resource Allocation and Trajectory Planning,” in 2022 4th International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI), 2022, pp. 238–241. doi: 10.1109/MLBDBI58171.2022.00053.
T. Wu, H. Ye, Z. Xiang, and X. Yang, “Speed and heading control of an unmanned surface vehicle using deep reinforcement learning,” in 2023 IEEE 12th Data Driven Control and Learning Systems Conference (DDCLS), 2023, pp. 573–578. doi: 10.1109/DDCLS58216.2023.10166143.
J. Kiefer and K. Dorer, “Double Deep Reinforcement Learning,” in 2023 IEEE International Conference on Autonomous Robot Systems and Competitions (ICARSC), 2023, pp. 17–22. doi: 10.1109/ICARSC58346.2023.10129640.
L. P, S. V, V. Sasikala, J. Arunarasi, A. R. Rajini, and N. Nithiya, “Fake Profile Identification in Social Network using Machine Learning and NLP,” in 2022 International Conference on Communication, Computing and Internet of Things (IC3IoT), 2022, pp. 1–4. doi: 10.1109/IC3IOT53935.2022.9767958.
D. MacDonald et al., “Cyber/physical security vulnerability assessment integration,” in 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), 2013, pp. 1–6. doi: 10.1109/ISGT.2013.6497883.
