THE ROLE OF ARTIFICIAL INTELLIGENCE IN DETECTING CYBERATTACKS ON ENERGY SYSTEMS
Authors: Inda Kreso
Affiliation: University of Sarajevo
Category:
Keywords: artificial intelligence, cybersecurity, cyberattacks, machine learning, energy sector
ABSTRACT. The latest trends in the energy sector demand the digitalization of energy infrastructure, which significantly enables more efficient production, distribution, transmission, and management of electricity. There are also additional security risks that come with making the energy system digital. Cyberattacks are happening more and more often on systems like SCADA and Smart Grids. An attack on energy infrastructure might put national security at risk. Artificial Intelligence (AI) is already being intensively used across various areas of the energy sector, but it’s true significance lies in whether AI algorithms can detect cyberattacks in advance and trigger timely alerts to prevent them. This paper is designed as an experimental case study with a strong literature review. A publicly available data set that is a simulation of energy network data under a cyberattack is used to train three different commonly used machine learning based AI models in order to see which one is the best at detecting a cyberattack on energy infrastructure. Three commonly used machine learning based algorithm that are used in IDS (Intrusion Detection System) were used in this research in order to comparatively test their performance of detecting cyberattacks or threats in the energy systems: Random Forest (RF), Ranger Random Forest (RANGER RF), and XGBoost. The training process and analysis were conducted in RStudio, an integrated development environment (IDE) for R programming, and the programming language was R. This research aimed not only to provide a comprehensive literature review through which gaps and shortcomings in the existing body of work were identified, but also to address a clearly visible gap in the literature, the lack of concrete applications of AI methods for detecting cyberattacks on energy infrastructure, by implementing a practical example using AI models on a dataset simulating cyberattacks on an energy network. This research concludes that RANGER RF algorithm (optimized version of Random Forest) proves to be the most efficient one. RANGER RF has the best performance when it comes to detecting cyberattacks on energy infrastructure and the most suitable as a part of Intrusion Detection Systems (IDS).
References:
Ajayi, Olanrewaju, Chisom Alozie, and Olumese Abieba. 2025. “Enhancing Cybersecurity in Energy Infrastructure: Strategies for Safeguarding Critical Systems in the Digital Age.” Trends in Renewable Energy 11 (2): 201–12. https://doi.org/10.17737/tre.2025.11.2.00192.
Alqurashi, Reem K. 2020. “Cyber Attacks and Impacts: A Case Study in Saudi Arabia.” International Journal of Advanced Trends in Computer Science and Engineering 9 (1): 217–24. https://doi.org/10.30534/ijatcse/2020/33912020
Alshamsi, Saif Abdulla Saeed Abdulla, Tuan Pah Rokiah Syed Hussain, and Sharif Shofirun Sharif Ali. 2024. “The Role of Artificial Intelligence on the Public Energy Sector Performance in the United Arab Emirates: The Mediation Role of Organizational Agility.” Journal of Law and Sustainable Development 12 (1): e2808. https://doi.org/10.55908/sdgs.v12i1.2808.
Amjad, Maaz, Irshad Ahmad, Mahmood Ahmad, Piotr Wróblewski, Paweł Kamiński, and Uzair Amjad. 2022. “Prediction of Pile Bearing Capacity Using XGBoost Algorithm: Modeling and Performance Evaluation.” Applied Sciences 12 (4): 2126. https://doi.org/10.3390/app12042126.
Aydın, Zühre. 2025. “Detecting Cybersecurity Threats in Digital Energy Systems Using Deep Learning for Imbalanced Datasets.” International Journal of Energy Economics and Policy 15 (3): 614–28. https://doi.org/10.32479/ijeep.19649.
Basholli, Fatmir. n.d. Cyber Warfare, a New Aspect of Modern Warfare.
Bouramdane, Ayat Allah. 2023. “Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones That Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process.” Journal of Cybersecurity and Privacy 3 (4): 662–705. https://doi.org/10.3390/jcp3040031.
Burgos, Marcelo Fabian Guato, Jorge Morato, and Fernanda Paulina Vizcaino Imacaña. 2024. “A Review of Smart Grid Anomaly Detection Approaches Pertaining to Artificial Intelligence.” In Applied Sciences (Switzerland), vol. 14. no. 3. Multidisciplinary Digital Publishing Institute (MDPI), February. https://doi.org/10.3390/app14031194.
Ding, Jianguo, Attia Qammar, Zhimin Zhang, Ahmad Karim, and Huansheng Ning. 2022. “Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions.” Energies 15 (18). https://doi.org/10.3390/en15186799.
Evans, Carol V. 2020. “Future Warfare: Weaponizing Critical Infrastructure.” The US Army War College Quarterly: Parameters 50 (2). https://doi.org/10.55540/0031-1723.1017.
Fan, Zhencheng, Zheng Yan, and Shiping Wen. 2023. “Deep Learning and Artificial Intelligence in Sustainability: A Review of SDGs, Renewable Energy, and Environmental Health.” Sustainability (Switzerland) 15 (18). https://doi.org/10.3390/su151813493.
Farivar, Faezeh, Mohammad Sayad Haghighi, Alireza Jolfaei, and Mamoun Alazab. 2020. “Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT.” IEEE Transactions on Industrial Informatics 16 (4): 2716–25. https://doi.org/10.1109/TII.2019.2956474.
Geiger, Marcus, Jochen Bauer, Michael Masuch, and Jorg Franke. 2020. “An Analysis of Black Energy 3, Crashoverride, and Trisis, Three Malware Approaches Targeting Operational Technology Systems.” 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), September, 1537–43. https://doi.org/10.1109/ETFA46521.2020.9212128.
Ghelani, Diptiben. 2022. “Cyber Security in Smart Grids, Threats, and Possible Solutions.” American Journal of Applied Scientific Research x, No. x. https://doi.org/10.11648/j.XXXX.2022XXXX.XX.
Govea, Jaime, Walter Gaibor-Naranjo, and William Villegas-Ch. 2024. “Transforming Cybersecurity into Critical Energy Infrastructure: A Study on the Effectiveness of Artificial Intelligence.” Systems 12 (5). https://doi.org/10.3390/systems12050165.
Habibi, Mohammad Reza, Hamid Reza Baghaee, Tomislav Dragičević, and Frede Blaabjerg. 2021. “Detection of False Data Injection Cyber-Attacks in DC Microgrids Based on Recurrent Neural Networks.” IEEE Journal of Emerging and Selected Topics in Power Electronics 9 (5): 5294–310. https://doi.org/10.1109/JESTPE.2020.2968243.
Israel Uzoagba, Chibuike, and BY Chibuike Israel Uzoagba. 2024. ENERGY GRID RESILIENCE AND CYBER SECURITY. https://www.researchgate.net/publication/381610122.
Kumar, Shreyas, and Gourav Nagar. 2024. “Threat Modeling for Cyber Warfare Against Less Cyber-Dependent Adversaries.” European Conference on Cyber Warfare and Security 23 (1): 257–64. https://doi.org/10.34190/eccws.23.1.2462.
Majidi, Seyed Hossein, Shahrzad Hadayeghparast, and Hadis Karimipour. 2022. “FDI Attack Detection Using Extra Trees Algorithm and Deep Learning Algorithm-Autoencoder in Smart Grid.” International Journal of Critical Infrastructure Protection 37 (July): 100508. https://doi.org/10.1016/j.ijcip.2022.100508.
Makala, Baloko, and Tonci Bakovic. n.d. Artificial Intelligence in the Power Sector. www.ifc.org/thoughtleadership.
Mohamed, Nachaat, Mohamed El-Guindy, Adel Oubelaid, and Saif Khameis Almazrouei. 2023. “Smart Energy Meets Smart Security: A Comprehensive Review of AI Applications in Cybersecurity for Renewable Energy Systems.” International Journal of Electrical and Electronics Research 11 (3): 728–32. https://doi.org/10.37391/ijeer.110313.
Mohammed, Saad Hammood, Abdulmajeed Al-Jumaily, Mandeep S. Jit Singh, et al. 2024a. “A Review on the Evaluation of Feature Selection Using Machine Learning for Cyberattack Detection in Smart Grid.” IEEE Access 12: 44023–42. https://doi.org/10.1109/ACCESS.2024.3370911.
Mohammed, Saad Hammood, Abdulmajeed Al-Jumaily, Mandeep S. Jit Singh, et al. 2024b. “A Review on the Evaluation of Feature Selection Using Machine Learning for Cyberattack Detection in Smart Grid.” IEEE Access 12: 44023–42. https://doi.org/10.1109/ACCESS.2024.3370911.
Mohammed, Saad Hammood, Mandeep S. Jit Singh, Abdulmajeed Al-Jumaily, et al. 2025. “Dual-Hybrid Intrusion Detection System to Detect False Data Injection in Smart Grids.” PLOS ONE 20 (1): e0316536. https://doi.org/10.1371/journal.pone.0316536.
Mrabet, Zakaria El, Naima Kaabouch, Hassan El Ghazi, and Hamid El Ghazi. 2018. “Cyber-Security in Smart Grid: Survey and Challenges.” Computers and Electrical Engineering 67 (April): 469–82. https://doi.org/10.1016/j.compeleceng.2018.01.015.
Olorunlana, Taiwo Justice, and Hamdiya Mohammed. 2025. “Analysis of the Colonial Pipeline Cybersecurity Incident.” International Journal of Science, Architecture, Technology and Environment, April, 9–13. https://doi.org/10.63680/jngh0767as.
Ortega-Fernandez, Ines, and Francesco Liberati. 2023. “A Review of Denial of Service Attack and Mitigation in the Smart Grid Using Reinforcement Learning.” Energies 16 (2): 635. https://doi.org/10.3390/en16020635
Panthi, Manikant. 2020. “Anomaly Detection in Smart Grids Using Machine Learning Techniques.” 2020 1st International Conference on Power, Control and Computing Technologies, ICPC2T 2020, January, 220–22. https://doi.org/10.1109/ICPC2T48082.2020.9071434.
Pitman, Lora, and Wendy Crosier. 2024. “On the Scale from Ransomware to Cyberterrorism: The Cases of JBS USA, Colonial Pipeline and the Wiperware Attacks against Ukraine.” Journal of Cyber Policy 9 (2): 179–99. https://doi.org/10.1080/23738871.2024.2377670.
Plėta, Tomas, Manuela Tvaronavičienė, Silvia Della Casa, and Konstantin Agafonov. 2020. “Cyber-Attacks to Critical Energy Infrastructure and Management Issues: Overview of Selected Cases.” Insights into Regional Development 2 (3): 703–15. https://doi.org/10.9770/IRD.2020.2.3(7).
Radoglou-Grammatikis, Panagiotis I., and Panagiotis G. Sarigiannidis. 2019. “Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems.” IEEE Access 7: 46595–620. https://doi.org/10.1109/ACCESS.2019.2909807.
Reka, S. Sofana, Tomislav Dragicevic, Prakash Venugopal, V. Ravi, and Manoj Kumar Rajagopal. 2024. “Big Data Analytics and Artificial Intelligence Aspects for Privacy and Security Concerns for Demand Response Modelling in Smart Grid: A Futuristic Approach.” Heliyon 10 (15). https://doi.org/10.1016/j.heliyon.2024.e35683.
Sakr, Hesham A., Mostafa M. Fouda, Ahmed F. Ashour, Ahmed Abdelhafeez, Magda I. El-Afifi, and Mohamed Refaat Abdellah. 2024. “Machine Learning-Based Detection of DDoS Attacks on IoT Devices in Multi-Energy Systems.” Egyptian Informatics Journal 28 (December). https://doi.org/10.1016/j.eij.2024.100540.
Salman, Hasan Ahmed, Ali Kalakech, and Amani Steiti. 2024. “Random Forest Algorithm Overview.” Babylonian Journal of Machine Learning 2024 (June): 69–79. https://doi.org/10.58496/BJML/2024/007.
Schonlau, Matthias, and Rosie Yuyan Zou. 2020. “The Random Forest Algorithm for Statistical Learning.” The Stata Journal: Promoting Communications on Statistics and Stata 20 (1): 3–29. https://doi.org/10.1177/1536867X20909688.
Stergiopoulos, George, Dimitris A. Gritzalis, and Evangelos Limnaios. 2020. “Cyber-Attacks on the Oil & Gas Sector: A Survey on Incident Assessment and Attack Patterns.” IEEE Access 8: 128440–75. https://doi.org/10.1109/ACCESS.2020.3007960.
Szczepaniuk, Hubert, and Edyta Karolina Szczepaniuk. 2023. “Applications of Artificial Intelligence Algorithms in the Energy Sector.” Energies 16 (1). https://doi.org/10.3390/en16010347.
Tanay Kulkarni. 2022. “Cyber‐Physical Convergence in Critical Infrastructure Security: A Comparative Review of Cybersecurity Strategies in the Water and Energy Sectors.” International Journal For Multidisciplinary Research 4 (3). https://doi.org/10.36948/ijfmr.2022.v04i03.37530.
Wei Gao, Thomas Morris, Bradley Reaves, and Drew Richey. 2010. “On SCADA Control System Command and Response Injection and Intrusion Detection.” 2010 eCrime Researchers Summit, 1–9. https://doi.org/10.1109/ecrime.2010.5706699.
Zhang, Ping, Yiqiao Jia, and Youlin Shang. 2022. “Research and Application of XGBoost in Imbalanced Data.” International Journal of Distributed Sensor Networks 18 (6): 155013292211069. https://doi.org/10.1177/15501329221106935.
Menu