2020 IEEE International Conference on Data Mining (ICDM) 2020
DOI: 10.1109/icdm50108.2020.00012
|View full text |Cite
|
Sign up to set email alerts
|

Defending Water Treatment Networks: Exploiting Spatio-Temporal Effects for Cyber Attack Detection

Abstract: While Water Treatment Networks (WTNs) are critical infrastructures for local communities and public health, WTNs are vulnerable to cyber attacks. Effective detection of attacks can defend WTNs against discharging contaminated water, denying access, destroying equipment, and causing public fear. While there are extensive studies in WTNs attack detection, they only exploit the data characteristics partially to detect cyber attacks. After preliminary exploring the sensing data of WTNs, we find that integrating sp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
2

Relationship

3
6

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…However, GNNs require graph-structured data as input, which, in our case, are frequently unknown and must be captured from the data. STGs [13] manually construct graph-structured data and use GCNs to encode spatial information. For datasets lacking clear graph topologies, this method can become impractical.…”
Section: Graph Neural Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…However, GNNs require graph-structured data as input, which, in our case, are frequently unknown and must be captured from the data. STGs [13] manually construct graph-structured data and use GCNs to encode spatial information. For datasets lacking clear graph topologies, this method can become impractical.…”
Section: Graph Neural Networkmentioning
confidence: 99%
“…GNNs are better suited for using spatial information causality between sensors for unsupervised anomaly detection because they can benefit from the internal structure information [12]. In [13], the graph's structure was manually constructed, and the spatial information was encoded using a graph convolutional network (GCN) [14]. However, for datasets without clear graph topologies (the relationship between sensors is sometimes implicit), this approach becomes impractical.…”
Section: Introductionmentioning
confidence: 99%
“…Du et al proposed a new spatial representation learning framework to capture the static and dynamic characteristics among the spatial entities for predicting housing price [12]. Wang et al employed a spatio-temporal representation learning module to extract the features of cyber attack in a graph for cyber attack detection [43]. In this paper, to incorporate the surrounding context characteristics into our framework, we employ representation learning to preserve the spatial attributed graphs constructed by the contexts into low-dimensional vectors.…”
Section: Related Workmentioning
confidence: 99%
“…This issue relates to two tasks: 1) deep representation learning; 2) label generation and matching for latent embedded features. Although there has been a rich body of work in SRL, including node embedding, autoencoder, random walk, adversarial learning, generative learning based methods with spatial data [14][15][16][17], research in unifying the two tasks is still in its early stage.…”
Section: Introductionmentioning
confidence: 99%