Clustered Federated Learning for Early Stage Cyber Attacks Detection in Power Systems

Conference Paper (2025)
Author(s)

M. Myat Thwe (TU Delft - Intelligent Electrical Power Grids)

P. Palensky (TU Delft - Electrical Sustainable Energy)

Alexandru Stefanov (TU Delft - Intelligent Electrical Power Grids)

Research Group
Intelligent Electrical Power Grids
DOI related publication
https://doi.org/10.1109/ISGTEurope64741.2025.11305511
More Info
expand_more
Publication Year
2025
Language
English
Research Group
Intelligent Electrical Power Grids
Bibliographical Note
Green Open Access added to TU Delft Institutional Repository as part of the Taverne amendment. More information about this copyright law amendment can be found at https://www.openaccess.nl. Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.@en
ISBN (print)
979-8-3315-2504-0
ISBN (electronic)
979-8-3315-2503-3
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

The increasing digitalization of Cyber-Physical Power Systems (CPPS) has enhanced power system operation and control but has also expanded the attack surface for cyber threats. Detection of early-stage attacks such as reconnaissance and Denial-of-Service (DoS) is critical to prevent power system-wide disruptions. Centralized Machine Learning (ML)-based techniques have been proposed for detecting cyber attacks. However, they struggle to ensure data privacy. Federated Learning (FL) can address this issue through collaborative model training without raw data sharing. Yet, FL’s performance degrades under non-Independent and Identically Distributed (non-IID) data, a common scenario in real-world CPPS environments. In this paper, we propose a cluster-based FL method using Bidirectional Long Short-Term Memory (BiLSTM) for attack detection at the early stages of the cyber kill chain. It uses unsupervised clustering of client model updates for aggregation robustness and model generalization across heterogeneous clients. By grouping clients based on similarity in model updates, our method mitigates the adverse effects of data heterogeneity while preserving data privacy. The UNSW-NB15 dataset is used for distributed training under non-IID conditions and evaluation of the proposed method. Experimental results demonstrate that our cluster-based FL method achieves over 95% detection accuracy, proving its effectiveness in distributed cyber attacks detection in power systems.

Files

License info not available
warning

File under embargo until 30-06-2026