World Environmental and Water Resources Congress 2017 2017
DOI: 10.1061/9780784480625.063
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Cyber Physical Attacks on Water Distribution Systems via Principal Component Analysis and Artificial Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(40 citation statements)
references
References 8 publications
0
39
0
1
Order By: Relevance
“…Another work that achieved a high score in the competition is [39] in which the authors proposed a three-layer method, where the first layer detects statistical anomalies, the second layer is a neural network aimed at finding contextual inconsistencies with normal operation, and the third layer uses principal component analysis (PCA) on all sensor data to classify the samples as normal or abnormal. Our work differs from [39] in the following ways. First, we study the efficiency of a single generic mechanism, as opposed to the multilevel system used by [39].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Another work that achieved a high score in the competition is [39] in which the authors proposed a three-layer method, where the first layer detects statistical anomalies, the second layer is a neural network aimed at finding contextual inconsistencies with normal operation, and the third layer uses principal component analysis (PCA) on all sensor data to classify the samples as normal or abnormal. Our work differs from [39] in the following ways. First, we study the efficiency of a single generic mechanism, as opposed to the multilevel system used by [39].…”
Section: Related Workmentioning
confidence: 99%
“…First, we study the efficiency of a single generic mechanism, as opposed to the multilevel system used by [39]. Second, our solution evaluates types of neural networks not covered by [39]. In addition, we study frequency domain anomaly detection and adversarial robustness.…”
Section: Related Workmentioning
confidence: 99%
“…Taormina and Galelli [81,82] used autoencoders (deep neural networks) in detecting attacks. Abokifa et al [83,84] proposed a detection approach composed of three layers to detect anomalies in the BATADAL datasets; first removing outliers using statistical analysis then, using a feed forward artificial neural network (ANN), a multilayer perceptron (MLP) to identify anomalies and, finally, principal component analysis (PCA) to identify multiple affected sensors. Giacomoni et al [85] developed two detection approaches based on data-mining.…”
Section: Cyber-attack Detection Modelsmentioning
confidence: 99%
“…Seven teams [28][29][30][31][32][33][34] took part in the competition and all of the teams but two proposed multi-stage detection algorithms. One of the teams that didn't produced a model based technique that simulated the hydraulic processes using EPANET and used the error between the expected and actual values to determine whether or not an attack had occurred [28].…”
Section: The Battle Of the Attack Detection Algorithmsmentioning
confidence: 99%