World Environmental and Water Resources Congress 2017 2017
DOI: 10.1061/9780784480595.010
|View full text |Cite
|
Sign up to set email alerts
|

Water Distribution Systems Analysis Symposium–Battle of the Attack Detection Algorithms (BATADAL)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…The second uses these events along with raw data to train a deep learning model, a convolutional variational autoencoder, to detect attacks. Aghashahi et al [91] first extracted features related to the characteristics of the attack and no-attack data by using a covariance matrix and distance measure of every data point. Then, a random forest classifier was used to classify these characteristics as attack and normal operation.…”
Section: Cyber-attack Detection Modelsmentioning
confidence: 99%
“…The second uses these events along with raw data to train a deep learning model, a convolutional variational autoencoder, to detect attacks. Aghashahi et al [91] first extracted features related to the characteristics of the attack and no-attack data by using a covariance matrix and distance measure of every data point. Then, a random forest classifier was used to classify these characteristics as attack and normal operation.…”
Section: Cyber-attack Detection Modelsmentioning
confidence: 99%
“…A two-stage method based on feature vector extraction and classification was proposed in [12]: vector extraction was applied to multidimensional hydraulic data, and safety classification was performed by random forests, the machine-learning algorithm developed by [13]. In [14] recurrent neural networks (RNNs) were used for hydraulic state estimation of network district metered areas and, based on the RNN output, a statistical control process was applied for detecting abrupt changes in the residual time series.…”
Section: Related Workmentioning
confidence: 99%
“…FP and FN are the numbers of false positive and false negative time stamps. Criteria (9) and (12) are considered by [7] and the final score S is calculated as a weighted sum of S TTD and SCR (13)…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Traditional anomaly detection techniques [24][25][26][27][28] combined with densitybased and parametric algorithms [29] The use of multi-stage techniques that isolates both local and global anomalies will generally yield better anomaly detection results. The proposed approach outperforms the density-based techniques and has comparable results to the parametric algorithms.…”
Section: Approach Advantages Shortcomingsmentioning
confidence: 99%