Detection of Non-Technical Losses: The Project MIDAS

The MIDAS project began in 2006 as collaboration between Endesa, Sadiel, and the University of Seville. The objective of the MIDAS project is the detection of Non-Technical Losses (NTLs) on power utilities. The NTLs represent the non-billed energy due to faults or illegal manipulations in clients’ facilities. Initially, research lines study the application of techniques of data mining and neural networks. After several researches, the studies are expanded to other research fields: expert systems, text mining, statistical techniques, pattern recognition, etc. These techniques have provided an automated system for detection of NTLs on company databases. This system is in the test phase, and it is applied in real cases in company databases.

[1]  M. Weatherford,et al.  Mining for fraud , 2002 .

[2]  G. Gonzalez,et al.  Strategic Plan for the Control and Reduction of Non-Technical Losses applied in C.A. Energia Eléctrica de Valencia , 2006, 2006 IEEE/PES Transmission & Distribution Conference and Exposition: Latin America.

[3]  Zhao Yang Dong,et al.  Detection rules for Non Technical Losses analysis in power utilities , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[4]  Volker Tresp,et al.  Fraud detection in communication networks using neural and probabilistic methods , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[5]  A.H. Nizar,et al.  Load Profiling Method in Detecting non-Technical Loss Activities in a Power Utility , 2006, 2006 IEEE International Power and Energy Conference.

[6]  Ekrem Duman,et al.  Improving a credit card fraud detection system using genetic algorithm , 2010, 2010 International Conference on Networking and Information Technology.

[7]  J.M.R. Iglesias Follow-up and Preventive Control of Non-Technical Losses of Energy in C.A. Electricidad de Valencia , 2006, 2006 IEEE/PES Transmission & Distribution Conference and Exposition: Latin America.

[8]  Lingfeng Wang,et al.  Support vector machine based data classification for detection of electricity theft , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.

[9]  C. M. V. Tahan,et al.  Commercial losses estimations through consumers' behavior analysis , 2009 .

[10]  Farrukh Nagi,et al.  Improving SVM-Based Nontechnical Loss Detection in Power Utility Using the Fuzzy Inference System , 2011, IEEE Transactions on Power Delivery.

[11]  S.K. Tiong,et al.  NTL detection of electricity theft and abnormalities for large power consumers In TNB Malaysia , 2010, 2010 IEEE Student Conference on Research and Development (SCOReD).

[12]  Carlos León,et al.  Using Regression Analysis to Identify Patterns of Non-Technical Losses on Power Utilities , 2010, KES.

[13]  José Edison Cabral,et al.  Fraud detection in electrical energy consumers using rough sets , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[14]  Olivier Festor,et al.  A survey on fraud and service misuse in voice over IP (VoIP) networks , 2011, Inf. Secur. Tech. Rep..

[15]  Wu Liu,et al.  Intrusion Detection Using SVM , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[16]  João Paulo Papa,et al.  What is the importance of selecting features for non-technical losses identification? , 2011, 2011 IEEE International Symposium of Circuits and Systems (ISCAS).

[17]  Xizhao Wang,et al.  A feature space analysis for anomaly detection , 2005, 2005 IEEE International Conference on Systems, Man and Cybernetics.

[18]  Lingfeng Wang,et al.  Measures and setbacks for controlling electricity theft , 2010, North American Power Symposium 2010.

[19]  A. J. Wilks Hall effect based electrical energy metering device with fraud detection and instantaneous voltage, current and power outputs , 1990 .

[20]  Mahmoud Reza Hashemi,et al.  Mining information from credit card time series for timelier fraud detection , 2010, 2010 5th International Symposium on Telecommunications.

[21]  Zhao Yang Dong,et al.  Customer Information System Data Pre-Processing with Feature Selection Techniques for Non-Technical Losses Prediction in an Electricity Market , 2006, 2006 International Conference on Power System Technology.

[22]  Carlos León,et al.  A Data Mining Method Based on the Variability of the Customer Consumption - A Special Application on Electric Utility Companies , 2008, ICEIS.

[23]  Rajendra P. Srivastava,et al.  Detection of management fraud: a neural network approach , 1995, Proceedings the 11th Conference on Artificial Intelligence for Applications.

[24]  A. H. Nizar,et al.  Identification and detection of electricity customer behaviour irregularities , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.

[25]  Danko Basch,et al.  Detection of suspicious patterns of energy consumption using neural network trained by generated samples , 2011, Proceedings of the ITI 2011, 33rd International Conference on Information Technology Interfaces.

[26]  Juan I Guerrero,et al.  Increasing the efficiency in Non-Technical Losses detection in utility companies , 2010, Melecon 2010 - 2010 15th IEEE Mediterranean Electrotechnical Conference.

[27]  Carlos León,et al.  Integrated expert system applied to the analysis of non-technical losses in power utilities , 2011, Expert Syst. Appl..

[28]  José R. Dorronsoro,et al.  Neural fraud detection in credit card operations , 1997, IEEE Trans. Neural Networks.

[29]  F. Mwaura,et al.  Adopting electricity prepayment billing system to reduce non-technical energy losses in Uganda: Lesson from Rwanda , 2012 .

[30]  A. Barin,et al.  Assessment of the smart grids applied in reducing the cost of distribution system losses , 2010, 2010 7th International Conference on the European Energy Market.

[31]  Syed Khaleel Ahmed,et al.  Detection of abnormalities and electricity theft using genetic Support Vector Machines , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.

[32]  Ming Xue,et al.  Applied Research on Data Mining Algorithm in Network Intrusion Detection , 2009, 2009 International Joint Conference on Artificial Intelligence.

[33]  João O. P. Pinto,et al.  Fraud detection system for high and low voltage electricity consumers based on data mining , 2009, 2009 IEEE Power & Energy Society General Meeting.

[34]  M.E. de Oliveira,et al.  A statistical analysis of loss factor to determine the energy losses , 2008, 2008 IEEE/PES Transmission and Distribution Conference and Exposition: Latin America.

[35]  Joao Onofre Pereira Pinto,et al.  Fraud Detection in Electric Energy Using Differential Evolution , 2009, 2009 15th International Conference on Intelligent System Applications to Power Systems.

[36]  Douglas L. Reilly,et al.  Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.

[37]  A. N. de Souza,et al.  Detection and Identification of Abnormalities in Customer Consumptions in Power Distribution Systems , 2011, IEEE Transactions on Power Delivery.

[38]  Dave Openshaw Smart metering an energy networks perspective , 2008 .

[39]  J.O.P. Pinto,et al.  Fraud detection in high voltage electricity consumers using data mining , 2008, 2008 IEEE/PES Transmission and Distribution Conference and Exposition.

[40]  Y. Sahin,et al.  Detecting credit card fraud by ANN and logistic regression , 2011, 2011 International Symposium on Innovations in Intelligent Systems and Applications.

[41]  C C O Ramos,et al.  A New Approach for Nontechnical Losses Detection Based on Optimum-Path Forest , 2011, IEEE Transactions on Power Systems.

[42]  A.H. Nizar,et al.  A Data Mining Based NTL Analysis Method , 2007, 2007 IEEE Power Engineering Society General Meeting.

[43]  Mohamed L. Hambaba Intelligent hybrid system for data mining , 1996, IEEE/IAFE 1996 Conference on Computational Intelligence for Financial Engineering (CIFEr).

[44]  Bernd Freisleben,et al.  CARDWATCH: a neural network based database mining system for credit card fraud detection , 1997, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr).

[45]  Azlinah Mohamed,et al.  Telecommunication Fraud Prediction Using Backpropagation Neural Network , 2009, 2009 International Conference of Soft Computing and Pattern Recognition.

[46]  R. Alves,et al.  Reduction of Non-Technical Losses by Modernization and Updating of Measurement Systems , 2006, 2006 IEEE/PES Transmission & Distribution Conference and Exposition: Latin America.

[47]  Rüdiger W. Brause,et al.  Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.

[48]  A. B. Davis,et al.  Knowledge-based management of cellular clone fraud , 1992, [1992 Proceedings] The Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[49]  Bane Raman Raghunath,et al.  Network Intrusion Detection System (NIDS) , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[50]  Sieh Kiong Tiong,et al.  Nontechnical Loss Detection for Metered Customers in Power Utility Using Support Vector Machines , 2010, IEEE Transactions on Power Delivery.

[51]  Caio C. O. Ramos,et al.  Fast Non-Technical Losses Identification Through Optimum-Path Forest , 2009, 2009 15th International Conference on Intelligent System Applications to Power Systems.

[52]  Chang-Tien Lu,et al.  Survey of fraud detection techniques , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.

[53]  Wei Xu,et al.  A subjective and objective integrated method for fraud detection in financial systems , 2009, 2009 International Conference on Machine Learning and Cybernetics.

[54]  Ekrem Duman,et al.  A cost-sensitive decision tree approach for fraud detection , 2013, Expert Syst. Appl..

[55]  Lingfeng Wang,et al.  A hybrid neural network model and encoding technique for enhanced classification of energy consumption data , 2011, 2011 IEEE Power and Energy Society General Meeting.

[56]  Carlos León,et al.  A Mining Framework to Detect Non-technical Losses in Power Utilities , 2009, ICEIS.

[57]  Chao-Hsien Chu,et al.  A Review of Data Mining-Based Financial Fraud Detection Research , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[58]  Heejo Lee,et al.  SIPAD: SIP-VoIP Anomaly Detection using a Stateful Rule Tree , 2013, Comput. Commun..

[59]  S.G. Kerk An AMR study in an Indian utility , 2005, 2005 International Power Engineering Conference.

[60]  Ali A. Ghorbani,et al.  Improved competitive learning neural networks for network intrusion and fraud detection , 2012, Neurocomputing.

[61]  A.H. Nizar,et al.  Load profiling and data mining techniques in electricity deregulated market , 2006, 2006 IEEE Power Engineering Society General Meeting.

[62]  Jian Ma,et al.  Fraud detection in telecommunication: A rough fuzzy set based approach , 2008, 2008 International Conference on Machine Learning and Cybernetics.

[63]  Salvatore J. Stolfo,et al.  Distributed data mining in credit card fraud detection , 1999, IEEE Intell. Syst..

[65]  Han Li Research and Implementation of an Anomaly Detection Model Based on Clustering Analysis , 2010, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.

[66]  Jorge Coelho,et al.  Probabilistic methodology for Technical and Non-Technical Losses estimation in distribution system , 2013 .

[67]  S.K. Tiong,et al.  Non-Technical Loss analysis for detection of electricity theft using support vector machines , 2008, 2008 IEEE 2nd International Power and Energy Conference.

[68]  Wang Dong,et al.  A feature extraction method for fraud detection in mobile communication networks , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).

[69]  Weiwei Chen,et al.  Anomaly detection in premise energy consumption data , 2011, 2011 IEEE Power and Energy Society General Meeting.

[70]  Joanne H. Pratt,et al.  Without Permission: Privacy on the Line , 2009, Int. J. Inf. Secur. Priv..

[71]  Olivier Flauzac,et al.  Grid of Security: A Decentralized Enforcement of the Network Security , 2012 .

[72]  A.H. Nizar,et al.  Power Utility Nontechnical Loss Analysis With Extreme Learning Machine Method , 2008, IEEE Transactions on Power Systems.