Intrusion Detection Systems in Smart Grids: A Review-Based Study

Shuriya B.*, Sivaprakash P.**, Mythili S.***, Karthiga S.****, Juliana Gnanaselvi K.*****
*,*** Department of Computer Science and Engineering, United Institute of Technology, Coimbatore, Tamil Nadu, India.
** Department of Computer Science and Engineering (AI and ML), Rathinam Technical Campus, Coimbatore, Tamil Nadu, India.
**** Department of Computer Science and Engineering, Rathinam Technical Campus, Coimbatore, Tamil Nadu, India.
***** Department of Computer Science, Rathinam College of Arts and Science, Coimbatore, Tamil Nadu, India.
Periodicity:July - December'2025

Abstract

The fast installation and rising complexity of smart grids brought immense cyber security problems with more than 50% of cyber-attacks on the energy sector now focusing on grid infrastructures, these systems have become a top priority to protect. IDSs play a vital role in detecting and containing malicious activities prior to having an effect on grid operations. This review paper offers an exhaustive examination of IDS techniques tailored for smart grid systems. The study follows the development of IDSs from conventional signature-based techniques, providing 70–80% detection rates, to sophisticated machine learning (ML) and artificial intelligence (AI)-driven techniques. These latest techniques have delivered detection rates of up to 98%, with a reduction in false positives of 30–40% in test environments. Hybrid IDS models that integrate automated learning and human knowledge have demonstrated further enhancements in adaptability and response to threats. IDS architectures are compared based on accuracy, scalability, power efficiency, and real-time response, with current systems operating at 8–10 W power for edge deployment and under 1-second latency. Moreover, the paper discusses the legal and ethical consequences of intrusion detection, with emphasis on the balance between robust security features and user privacy, especially within regulatory schemes like GDPR. Upcoming directions in IDS development are to incorporate block chain for safe and tamper-proof logging, embracing federated learning for privacy-preserving model training, and creating adaptive, multi-layer detection frameworks to improve robustness against constantly evolving and advanced cyber-physical attacks.

Keywords

Intelligent, Cyber-Attacks, Machine Learning, IDS, Smart Grid, Grid Protection.

How to Cite this Article?

Shuriya, B., Sivaprakash, P., Mythili, S., Karthiga S., and Gnanaselvi, K. J. (2025). Intrusion Detection Systems in Smart Grids: A Review-Based Study. i-manager’s Journal on Communication Engineering and Systems, 14(2), 44-51.

References

[11]. Mouna, P. S., Sivaprakash, P., Kumar, K. A., Samuel, P., Shuriya, B., & Sharma, V. (2024). Data modeling and analysis for the Internet of Medical Things. In Wireless Communication Technologies, CRC Press, pp. 197–223.
[15]. Shuriya, B., & Rajendran, A. (2017). Tranquilize role mining using HR (Heuristic Random) approach. Asian Journal of Research in Social Sciences and Humanities, 7(1), 744-753.
[16]. Shuriya, B., & Rajendran, A. (2019). A fuzzy responsibility-based access organizer for leukemia record protection using KWatts algorithm. Applied Mathematics, 13(6), 1047-1052.
[17]. Shuriya, B., & Thenmozhi, S. (2015). RBAM with constraint satisfaction problem in role mining. International Journal of Innovative Research and Development, 4(2).
[19]. Shuriya, B., Santhamani, V., Shanmugam, V. B., & Subashini, S. (2024). Enhancing network security through Viper Optimization Algorithm with deep learning assisted network security system in biomedical records. Frontiers in Health Informatics, 13(8).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 15 15 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.