What is it about?

Intrusion Detection Systems (IDSs) are often considered to be an important security mechanism for different use-cases. The Electric Vehicle (EV) charging use-case is one example, with various research articles proposing IDS solutions. One issue in this context, however, is the lack of representative datasets with a variety of realistic attack scenarios, which are vital for evaluating IDSs. Especially concerning the cyber-physical aspects of EV charging, representative datasets are missing and related work usually relies on normal charging data with generating random anomalies or manual attack insertions. This can result in unrealistic or biased attack data. In this paper, we address this issue by proposing a Generative Adversarial Network (GAN)-based IDS training method for EV charging. For this, a GAN is used against a pre-trained IDS to generate attack data that avoids detection. Afterwards, the IDS can be re-trained under consideration of the new attack data in order to eliminate persistent gaps or biases in detection. We implement and evaluate the GAN-based training system. Our evaluation shows the ability of the GAN to identify flaws in existing IDS s. Additionally, we show the effectiveness of re-training IDS s with the GAN output

Featured Image

Why is it important?

Continuous training and upgrading the IDS with normal working data is mandatory to keep false positive rate low. As a result of incorporating new data, the methodology to create also relevant attack data is also crucial to evaluate the newly trained model before deployment.

Read the Original

This page is a summary of: Improving Anomaly Detection for Electric Vehicle Charging with Generative Adversarial Networks, March 2025, ACM (Association for Computing Machinery),
DOI: 10.1145/3672608.3707823.
You can read the full text:

Read

Contributors

The following have contributed to this page