2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE) 2017
DOI: 10.1109/hase.2017.36
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
187
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 281 publications
(189 citation statements)
references
References 7 publications
1
187
0
1
Order By: Relevance
“…Some of them used supervised learning [8], [9] and achieved high precision results, however the supervised learning approach is limited to the modeled attacks only. To overcome this obstacle, a number of other studies used unsupervised deep neural networks (DNNs) for detecting anomalies and attacks in ICS data [10]- [12]. Kravchik and Shabtai [13] suggested using unsupervised neural networks based on 1D CNNs and demonstrated the detection of 31 out of 36 cyber attacks in the popular SWaT dataset [14], improving upon previously published results.…”
Section: Introductionmentioning
confidence: 83%
“…Some of them used supervised learning [8], [9] and achieved high precision results, however the supervised learning approach is limited to the modeled attacks only. To overcome this obstacle, a number of other studies used unsupervised deep neural networks (DNNs) for detecting anomalies and attacks in ICS data [10]- [12]. Kravchik and Shabtai [13] suggested using unsupervised neural networks based on 1D CNNs and demonstrated the detection of 31 out of 36 cyber attacks in the popular SWaT dataset [14], improving upon previously published results.…”
Section: Introductionmentioning
confidence: 83%
“…The SWaT testbed and its dataset [12] have been used to evaluate a number of other approaches for cyber-attack prevention, including learning classifiers from data [14], [19], monitoring network traffic [20], or monitoring process invariants [21], [22]. These process invariants are derived from the physical laws concerning different aspects of the SWaT system, and thus in our terminology can be considered in the category of rule-based anomaly detection methods.…”
Section: Related Workmentioning
confidence: 99%
“…Anomalies in the data are detected with a plethora of different approaches. Schneider et al use autoencoders to detect anomalies in cyber-physical system networks [25], Goh et al and Feng et al use neural networks for the detection [12,14]. One class support vector machines are presented by Maglaras et al as a machine learning algorithm to detect novel and unknown attacks [21].…”
Section: Anomaly Detection In Time Seriesmentioning
confidence: 99%