2022
DOI: 10.1109/tdsc.2021.3050101
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA

Abstract: Industrial control systems (ICSs) are widely used and vital to industry and society. Their failure can have severe impact on both the economy and human life. Hence, these systems have become an attractive target for physical and cyber attacks alike. In this paper, we examine an attack detection method based on simple and lightweight neural networks, namely, 1D convolutional neural networks and autoencoders. We apply these networks to both the time and frequency domains of the data and discuss the pros and cons… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
86
1
2

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 115 publications
(90 citation statements)
references
References 54 publications
1
86
1
2
Order By: Relevance
“…Many other models have been analysed. Convolution neural networks [19] have reached high F 1 scores and autoencoders have been investigated in [23], [24] as well as neural architecture search in [25]. Alternatively, ensembles of random trees are used in [26], or a range of classification methods including SVMs, neural networks, and tree based methods are compared in [27].…”
Section: Related Work For Intrusion Detectionmentioning
confidence: 99%
See 4 more Smart Citations
“…Many other models have been analysed. Convolution neural networks [19] have reached high F 1 scores and autoencoders have been investigated in [23], [24] as well as neural architecture search in [25]. Alternatively, ensembles of random trees are used in [26], or a range of classification methods including SVMs, neural networks, and tree based methods are compared in [27].…”
Section: Related Work For Intrusion Detectionmentioning
confidence: 99%
“…Alternatively, generative methods can be used to create adversarial attacks such as in [29] where generative adversarial networks (GANs) were used to create adversarial data. Additional work in [23] investigated adversarial attacks targeting an autoencoder IDS. Unlike [28], the work in [23] modelled their attacker as not having control of the communications to the IDS independently of the programmable logic controller (PLC).…”
Section: Related Work For Intrusion Detectionmentioning
confidence: 99%
See 3 more Smart Citations