The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2023
DOI: 10.3390/electronics12153283
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Anomaly Detection Strategies to Detect Threats to Cyber-Physical Systems

Nicholas Jeffrey,
Qing Tan,
José R. Villar

Abstract: Cyber-Physical Systems (CPS) are integrated systems that combine software and physical components. CPS has experienced rapid growth over the past decade in fields as disparate as telemedicine, smart manufacturing, autonomous vehicles, the Internet of Things, industrial control systems, smart power grids, remote laboratory environments, and many more. With the widespread integration of Cyber-Physical Systems (CPS) in various aspects of contemporary society, the frequency of malicious assaults carried out by adv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(6 citation statements)
references
References 270 publications
0
3
0
Order By: Relevance
“…This paper proposes a novel Ensemble Learning-Based Hybrid Anomaly Detection Method comprised of signature-based detection for known threats, threshold-based metrics for the immutable physical characteristics of a CPS, combined with an ensemble-based learning model for behaviour-based anomaly detection, with the goal of improved predictive performance over those of the existing anomaly detection methods, which is demonstrated using two public research datasets (Edge-IIoTset2023 and CICIoT2023). This paper builds upon previous works [14][15][16] by the authors of this paper, furthering the development of a generalizable framework for threat detection in CPS environments that can be applied in a broad variety of CPS environments through the use of EL to overcome weaknesses in existing threat detection models.…”
Section: Introductionmentioning
confidence: 94%
See 1 more Smart Citation
“…This paper proposes a novel Ensemble Learning-Based Hybrid Anomaly Detection Method comprised of signature-based detection for known threats, threshold-based metrics for the immutable physical characteristics of a CPS, combined with an ensemble-based learning model for behaviour-based anomaly detection, with the goal of improved predictive performance over those of the existing anomaly detection methods, which is demonstrated using two public research datasets (Edge-IIoTset2023 and CICIoT2023). This paper builds upon previous works [14][15][16] by the authors of this paper, furthering the development of a generalizable framework for threat detection in CPS environments that can be applied in a broad variety of CPS environments through the use of EL to overcome weaknesses in existing threat detection models.…”
Section: Introductionmentioning
confidence: 94%
“…While anomaly detection is a common area of study in ML, there has been limited attention given to threat detection to CPS environments, and less still in the specific area of EL as a strategy for improving accuracy in threat detection to CPSs. Interested readers on this topic may find this review paper [15] worth reading.…”
Section: Related Workmentioning
confidence: 99%
“…Anomaly detection in multivariate time series data is crucial for various applications, from network intrusion detection in cybersecurity to identifying faulty equipment in industrial settings [31,32,33,34,35]. Unlike univariate time series that analyze a single variable over time, multivariate time series deal with multiple interrelated variables [36,37,38,39,40,41,42], providing a richer picture of the underlying processes [43,44,45,46,47].…”
Section: Related Workmentioning
confidence: 99%
“…To mitigate the weaknesses of individual detection methods, many cybersecurity professionals and teams should follow the same path of hybrid method detection that combines several detection techniques. Hybrid systems leverage signature-based, anomaly-based, and behaviour-based detection strengths to enhance robustness and accuracy Jeffrey et al (2023). For instance, a hybrid system might use signatory-based detection systems for known threats, anomalous intrusion systems to uncover peculiar traffic patterns and user activity-monitoring intrusion systems.…”
Section: Limitations Strengths and Weakness Of Cyber-attacksmentioning
confidence: 99%