
An Efficient Hybrid Method for Coordinated Attacks Detection in NAN of Smart Grid
Neighborhood area network is a robust communication model essential for disturbance-free power distribution. The reliability of the network depends on the flow-based attack detection model but the lengthy flow completion introduces high latency. This potential delay buys the time for attackers to study and pose subsequent attacks. Thus, the packet-based analysis is utilized in this work to detect the attacks at early stages. The proposed Intrusion Detection System (IDS) is designed with deep learning based Bidirectional Long Short-Term Memory algorithm and attention mechanism. IDS, with multiheaded attention, is executed in the substation to analyze the consolidated collected data of the traffic and detect coordinated attacks in the network. The developed model works effectively in earlier attack detection and the secondary level is used only on requirement. The proposed IDS is evaluated with standard datasets like 5G_NIDS, CICIDS2017 and UNSW-LD. The results proved the efficiency of the proposed method in of Neighborhood Area Network (NAN) coordinated attacks detection of smart grid communication.
[1] Abid A., Jemili F., and Korba O., “Distributed Deep Learning Approach for Intrusion Detection System in Industrial Control Systems Based on Big Data Technique and Transfer Learning,” Journal of Information and Telecommunication, vol. 7, no. 4, pp. 513-541, 2023. https://doi.org/10.1080/24751839.2023.2239617
[2] Alaidaros H., Mahmuddin M., and Al Mazari A., “An Overview of Flow-based and Packet-based Intrusion Detection Performance in High-Speed Networks,” in Proceedings of the International Arab Conference on Information Technology, An Efficient Hybrid Method for Coordinated Attacks Detection in NAN of Smart Grid 127 Riyadh, pp. 1-9, 2011. file:///C:/Users/acit2k/Downloads/AnOverviewof Flow-BasedandPacket- BasedIntrusionDetectionPerformanceinHighSpee dNetworks%20(1).pdf
[3] Alrayes F., Nemri N., Aljaffan N., Alshuhail A., and et al., “Distributed Multiclass Cyberattack Detection using Golden Jackal Optimization with Deep Learning Model for Securing IoT Networks,” IEEE Access, vol. 12, pp. 132434- 132443, 2024. https://doi.org/10.1109/ACCESS.2024.3443202
[4] Anley M., Genovese A., Agostinello D., and Piuri V., “Robust DDoS Attack Detection with Adaptive Transfer Learning,” Computers and Security, vol. 144, pp. 103962, 2024. https://doi.org/10.1016/j.cose.2024.103962
[5] Chinnasamy R., Subramanian M., and Sengupta N., “Empowering Intrusion Detection Systems: A Synergistic Hybrid Approach with Optimization and Deep Learning Techniques for Network Security,” The International Arab Journal of Information Technology, vol. 22, no. 1, pp. 60-76, 2025. DOI: 10.34028/iajit/22/1/6
[6] Cisco NetFlow Configuration, https://www.cisco.com/c/dam/en/us/td/docs/secur ity/stealthwatch/netflow/Cisco_NetFlow_Config uration.pdf, Last Visited, 2025.
[7] Creech G. and Hu J., ‘‘Generation of a New IDS Test Dataset: Time to Retire the KDD Collection,’’ in Proceedings of the IEEE Wireless Communication and Networking Conference, Shanghai, pp. 4487-4492, 2013. https://doi.org/10.1109/WCNC.2013.6555301
[8] Diaba S. and Elmusrati M., “Proposed Algorithm for Smart Grid DDoS Detection based on Deep Learning,” Neural Networks, vol. 159, pp. 175- 184, 2023. https://doi.org/10.1016/j.neunet.2022.12.011
[9] Ding Y., Tian Y., Li X., Mishra Y., and et al., “Constrained Broadcast with Minimized Latency in Neighborhood Area Networks of Smart Grid,” IEEE Transactions on Industrial Informatics, vol. 16, no. 1, pp. 309-318, 2020. https://doi.org/10.1109/TII.2019.2915826
[10] Djaidja T., Brik B., Senouci S., Boualouache A., and Doudane Y., “Early Network Intrusion Detection Enabled by Attention Mechanisms and RNN,” IEEE Transactions on Information Forensics and Security, vol. 19, pp. 7783-7793, 2024. https://doi.org/10.1109/TIFS.2024.3441862
[11] Dong J., Xing L., Cui N., Zhao L., and et al., “Estimating Reference Crop Evapotranspiration Using Improved Convolutional Bidirectional Long Short-Term Memory Network by Multi- Head Attention Mechanism in the Four Climatic Zones of China,” Agricultural Water Management, vol. 292, pp. 108665, 2024. https://doi.org/10.1016/j.agwat.2023.108665
[12] Guha D., Chatterjee R., Sikdar B., “Anomaly Detection Using LSTM-based Variational Au- Toencoder in Unsupervised Data in Power Grid,” IEEE Systems Journal, vol. 17, no. 3, pp. 4313- 4323, 2023. https://doi.org/10.1109/JSYST.2023.3266554
[13] Hassan N., Miah A., and Shin J., “A Deep Bidirectional LSTM Model Enhanced by Transfer-Learning-based Feature Extraction for Dynamic Human Activity Recognition,” Applied Sciences, vol. 14, pp. 14020603, 2024. https://doi.org/10.3390/app14020603
[14] Hu C., Yan J., and Liu X., “Adaptive Feature Boosting of Multi Sourced Deep Autoencoders for Smart Grid Intrusion Detection,” in Proceedings of the IEEE Power and Energy Society General Meeting, Montreal, pp. 1-5, 2020. https://doi.org/10.1109/PESGM41954.2020.9281 934
[15] Jayalaxmi P., Saha R., Kumar G., Alazab M., and et al., “PIGNUS: A Deep Learning Model for IDS in Industrial Internet-of-Things,” Computers and Security, vol. 132, pp. 103315, 2023. https://doi.org/10.1016/j.cose.2023.103315
[16] Kardi M., Alskaif T., Tekinerdogan B., and Catalao J., “Anomaly Detection in Electric-Ity Consumption Data Using Deep Learning,” in Proceedings of the IEEE International Conference on Environment and Electrical Engineering and IEEE Industrial and Commercial Power Systems Europe, Bari, pp. 1-6, 2021. https://doi.org/10.1109/EEEIC/ICPSEurope5159 0.2021.9584650
[17] Kasongo S. and Sen Y., “Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on a UNSW-NB15 Dataset,” Journal of Big Data, vol. 7, no.1, pp. 1-20, 2020. https://doi.org/10.1186/s40537-020-00379-6
[18] Khan M., Houran M., Kauhaniemi K., Zafar M., and et al., “Efficient State of Charge Estimation of Lithium-Ion Batteries in Electric Vehicles Using Evolutionary Intelligence-Assisted GLA-CNN- Bi-LSTM Deep Learning Model,” Heliyon, vol. 10, pp. 1-20, 2024. https://doi.org/10.1016/j.heliyon.2024.e35183
[19] Kumar S., “Survey of Current Network Intrusion Detection Techniques,” Journal of Information Security, pp. 1-18, 2007. https://www.scirp.org/reference/referencespapers ?referenceid=436521
[20] Lansky J., Ali S., Mohammadi M., Majeed M., Karim S., and Rashidi S., “Deep Learning-based Intrusion Detection Systems: A Systematic Review,” IEEE Access, vol. 9, pp. 101574- 101599, 2021. https://doi.org/10.1109/ACCESS.2021.3097247
[21] Li H., Ge H., Sang Y., and Gao C., “An Optimized 128 The International Arab Journal of Information Technology, Vol. 23, No. 1, January 2026 Multi-Layer Ensemble Model for Airborne Networks Intrusion Detection,” Applied Soft Computing, vol. 167, pp. 112282, 2024. https://doi.org/10.1016/j.asoc.2024.112282
[22] Li Z., Zhong Z., Zuo P., and Zhao H., “A Personalized Federated Learning Method Based on the Residual Multi-Head Attention Mechanism,” Journal of King Saud University- Computer and Information Sciences, vol. 36, pp. 102043, 2024. https://doi.org/10.1016/j.jksuci.2024.102043
[23] Mahmud R., Vallakati R., Mukherjee A., Ranganathan P., and Nejadpak A., “A Survey on Smart Grid Metering Infrastructures: Threads and Solutions,” in Proceedings of the IEEE International Conference on Electro/Information Technology, Dekalb, pp. 386-391, 2015. https://doi.org/10.1109/EIT.2015.7293374
[24] Mokbal F., Dan W., Osman M., Ping Y., and Alsamhi S., “An Efficient Intrusion Detection Framework Based on Embedding Feature Selection and Ensemble Learning Technique,” The International Arab Journal of Information Technology, vol. 19, no. 2, pp. 237-248, 2022. DOI: 10.34028/iajit/19/2/11
[25] Peng W., Kong X., Peng G., Li X., and Wang Z., “Network Intrusion Detection based on Deep Learning,” in Proceedings of the International Conference on Communications, Information System and Computer Engineering, Haikou, pp. 431-435, 2019. https://doi.org/10.1109/CISCE.2019.00102
[26] Pietro R. and Mancini L., Intrusion Detection Systems, Springer New York, 2008. https://link.springer.com/book/10.1007/978-0- 387-77265-3
[27] Samarakoon S., Siriwardhana Y., Porambage P., Liyanage M., and et al., “5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated Over 5G Wireless Network,” Cryptography and Security, 2022. https://arxiv.org/abs/2212.01298v1
[28] Sharafaldin I., Lashkari A., and Ghorbani A., ‘‘Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization,’’ in Proceedings of the 4th International Conference on Information System Security and Privacy, Funchal, pp. 108-116, 2018. https://doi.org/10.5220/0006639801080116
[29] Umer M., Sher M., and Bi Y., “Flow-based Intrusion Detection: Techniques and Challenges,” Computers and Security, vol. 70, pp. 238-254, 2017. https://doi.org/10.1016/j.cose.2017.05.009
[30] Vijayanand R., Devaraj D., and Kannapiran B., “A Novel Intrusion Detection System for Wireless Mesh Network with Hybrid Feature Selection Technique Based on GA and MI,” Journal of Intelligent and Fuzzy Systems: Applications in Engineering and Technology, vol. 34, pp. 1243- 1250, 2018. https://doi.org/10.3233/JIFS-169421
[31] Wang N., Chen Y., Xiao Y., Hu Y., Lou W., and Hou Y., “Manda: On Adversarial Example Detection for Network Intrusion Detection System,” in Proceedings of the IEEE Transactions on Dependable and Secure Computing, Vancouver, pp. 1139-1153, 2023. https://doi.org/10.1109/INFOCOM42981.2021.9 488874
[32] Yakubu B., Khan M., Khan A., Jabeen F., and Jeon G., “Blockchain-based DDoS Attack Mitigation Protocol for Device-to-Device Interaction in Smart Home,” Digital Communications and Networks, vol. 9, pp. 383-392, 2023. https://doi.org/10.1016/j.dcan.2023.01.013