2021
DOI: 10.1145/3453155
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning-based Anomaly Detection in Cyber-physical Systems

Abstract: Anomaly detection is crucial to ensure the security of cyber-physical systems (CPS). However, due to the increasing complexity of CPSs and more sophisticated attacks, conventional anomaly detection methods, which face the growing volume of data and need domain-specific knowledge, cannot be directly applied to address these challenges. To this end, deep learning-based anomaly detection (DLAD) methods have been proposed. In this article, we review state-of-the-art DLAD methods in CPSs. We propose a taxonomy in t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 153 publications
(65 citation statements)
references
References 79 publications
0
52
0
Order By: Relevance
“…In [61], CPSs require the monitoring of network health information in a real-time and continuous manner in order to maintain the appropriate performance. However, as CPSs become more complicated and faults are increasingly diverse, the traditional methods for CPS anomaly detection and network performance estimation become less effective [62]. This motivated the use of ML-based approaches that do not rely on domain-specific knowledge [62,63].…”
Section: Discussion and Future Directionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [61], CPSs require the monitoring of network health information in a real-time and continuous manner in order to maintain the appropriate performance. However, as CPSs become more complicated and faults are increasingly diverse, the traditional methods for CPS anomaly detection and network performance estimation become less effective [62]. This motivated the use of ML-based approaches that do not rely on domain-specific knowledge [62,63].…”
Section: Discussion and Future Directionmentioning
confidence: 99%
“…However, as CPSs become more complicated and faults are increasingly diverse, the traditional methods for CPS anomaly detection and network performance estimation become less effective [62]. This motivated the use of ML-based approaches that do not rely on domain-specific knowledge [62,63]. These ML-based approaches have been widely used in CPS anomaly detection related to various types of attacks [62].…”
Section: Discussion and Future Directionmentioning
confidence: 99%
“…These matrices are then given as input to a convolutional encoder and an attention-based convolutional Long Short Term Memory (LSTM) to capture the temporal patterns. The same data representation has been used in (Luo et al, 2021), and applied to CPSs. In this case, a single scale has been used and the different time series represent measurements provided by a set of sensors.…”
Section: Security Approaches Based On Multi-dimensional Representation Of Traffic Datamentioning
confidence: 99%
“…According to the CPS definition, the distributed context could work both analyzing the measurements, and processing the network traffic data. Since, as pointed out in (Luo et al, 2021), the majority of the research literature has focused on detecting anomalies from sensor and actuator data, in this work we aim at analyzing the anomaly detection issue from the network traffic data point of view. Concerning the local data, in this case, they may concern the operating conditions of the CPS (e.g., weather forecast or presence of natural emergencies like fires and earthquakes), and the cost of the different mitigation actions.…”
Section: Cps Security Case Studymentioning
confidence: 99%
“…CPSs are a prime target for many cyber attack vectors such as Denial-of-Service (DOS), data injection, and interception schemes [17,18]. Anomaly Detection Systems (ADSs) are becoming a common component of CPSs which are implemented to detect anomalies in CPS networks [19]. These anomalies may be signs that an intruder is attempting unauthorized access to the system [20].…”
Section: Related Workmentioning
confidence: 99%