2022
DOI: 10.1109/access.2022.3173288
|View full text |Cite
|
Sign up to set email alerts
|

Federated Learning-Based Explainable Anomaly Detection for Industrial Control Systems

Abstract: We are now witnessing the rapid growth of advanced technologies and their application, leading to Smart Manufacturing (SM). The Internet of Things (IoT) is one of the main technologies used to enable smart factories, which is connecting all industrial assets, including machines and control systems, with the information systems and the business processes. Industrial Control Systems of smart IoT-based factories are one of the top industries attacked by numerous threats, especially unknown and novel attacks. As a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(11 citation statements)
references
References 29 publications
0
7
0
Order By: Relevance
“…An edge-computing-based FL architecture tailored for intelligent applications in Smart Manufacturing within the realm of Big Data. The comprehensive solution has demonstrated superior anomaly detection performance and offers rapid response times by executing anomaly detection near the sources of potential attacks, namely, at the edge [89]. The shortcomings of cyber attack detection in ICS are: It is crucial to study the limitations concerning data size and the number of features to maintain stable operation in edge computing environments.…”
Section: Cyber-attacks Detectionmentioning
confidence: 99%
“…An edge-computing-based FL architecture tailored for intelligent applications in Smart Manufacturing within the realm of Big Data. The comprehensive solution has demonstrated superior anomaly detection performance and offers rapid response times by executing anomaly detection near the sources of potential attacks, namely, at the edge [89]. The shortcomings of cyber attack detection in ICS are: It is crucial to study the limitations concerning data size and the number of features to maintain stable operation in edge computing environments.…”
Section: Cyber-attacks Detectionmentioning
confidence: 99%
“…Differential privacy methods, for example, have been used with XAI systems to make sure that explanations are produced without accidentally revealing private data [10][11][12]. Furthermore, improvements in federated learning make it possible to train collaborative models across decentralized data sources while improving explainability [13][14][15].…”
Section: Related Workmentioning
confidence: 99%
“…3 displays the number of variables with respect to k and b values. Figure 3 (left) shows the case of MDAV for different values of k, the value fluctuates slightly in the range [14,18]. For k = 6 the number of features reach the peak with 18 features.…”
Section: Cervical Cancer Risk Factorsmentioning
confidence: 99%
See 1 more Smart Citation
“…Huong et al [148] focus on improving XAI through the use of federated learning, approaching the existing challenges as a Big Data problem with low-powered edge devices feeding a centralized model called FedEX (Federated learning-based Explainable Anomaly Detection for Industrial Control Systems). This allows geographically distributed IIoT environments to leverage the resource-constrained sensor nodes to collect data, which undergoes local pre-processing on a moderately powerful edge node, with those pre-processed readings then forwarded to a more powerful centralized host for further processing and model training based on data aggregated from all the distributed edge nodes of the highly distributed control system.…”
Section: Using Ai/ml For Anomaly Detectionmentioning
confidence: 99%