Proceedings of the 6th ACM on Cyber-Physical System Security Workshop 2020
DOI: 10.1145/3384941.3409588
|View full text |Cite
|
Sign up to set email alerts
|

Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems

Abstract: Data-centric approaches are becoming increasingly common in the creation of defense mechanisms for critical infrastructure such as the electric power grid and water treatment plants. Such approaches often use well-known methods from machine learning and system identification, i.e., the Multi-Layer Perceptron, Convolutional Neural Network, and Deep Auto Encoders to create process anomaly detectors. Such detectors are then evaluated using data generated from an operational plant or a simulator; rarely is the ass… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 37 publications
(22 citation statements)
references
References 26 publications
0
19
0
Order By: Relevance
“…In [23], multilayer perception (MLP) and support vector machine (SVM) were used to predict the measurement parameters and to identify and classify the outliers in WDS. In [24] also, supervised and unsupervised detection models were developed to identify anomalies in water treatment plants. Nonetheless, these last two studies were focused on training the DNN model based on the water quality parameters, and hydraulic features of the system were not contemplated.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [23], multilayer perception (MLP) and support vector machine (SVM) were used to predict the measurement parameters and to identify and classify the outliers in WDS. In [24] also, supervised and unsupervised detection models were developed to identify anomalies in water treatment plants. Nonetheless, these last two studies were focused on training the DNN model based on the water quality parameters, and hydraulic features of the system were not contemplated.…”
Section: Introductionmentioning
confidence: 99%
“…Nonetheless, these last two studies were focused on training the DNN model based on the water quality parameters, and hydraulic features of the system were not contemplated. As such, the proposed models in [23,24] cannot detect any cyberattacks targeting the hydraulic-related readings of a WDS, such as the tank's level measurements. Despite significant efforts by previous studies in the application of deep learning and artificial intelligence on detection of different forms of cyberattacks in water systems, there are considerable limitations yet to be addressed to improve the performance and efficacy of the DNN-based cyberattack detection models.…”
Section: Introductionmentioning
confidence: 99%
“…However, the same networks simultaneously expose the system to malicious actors. Securing CPS is challenging and different from the pure IT systems in different ways [2], [3]. Recently there is a lot of attention being paid to develop defense technologies for CI.…”
Section: Introductionmentioning
confidence: 99%
“…For these reasons, it is necessary to have new intrusion detection schemes for ICS networks of both the process control and network communication levels. For this purpose, the use of machine learning algorithms seems to be appropriate at present [19][20][21][22][23]. However, there is a problem with available datasets suitable for learning, training, and testing.…”
Section: Introductionmentioning
confidence: 99%