Abstract
Cyber-physical critical infrastructures such as power plants are no longer air-gapped. Due to IP-Convergence, the control systems and sensor/actuator communication networks are often directly or indirectly connected to the Internet. While network intrusion detection can provide certain cyber defense capabilities, that is not sufficient due to covert attacks or insider attacks. Therefore, in recent years, a lot of research is being carried out to detect intrusion by observing anomalies in the plants’ physical dynamics. In this work, we propose a robust anomaly detection mechanism based on a semi-supervised machine learning technique allowing us near real-time localization of attacks. Deep neural network architecture is used to detect anomaly – based on reconstruction error. We demonstrate our method’s efficacy on the SWaT dataset. Our method outperforms other existing anomaly detection techniques with an AUC score of 0.9275.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bernabeu, E.E., Thorp, J.S., Centeno, V.: Methodology for a security/dependability adaptive protection scheme based on data mining. IEEE Trans. Power Deliv. 27(1), 104–111 (2011)
Goldenberg, N., Wool, A.: Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. Int. J. Crit. Infrastruct. Prot. 6, 63–75 (2013)
Adepu, S., Mathur, A.: Distributed Attack Detection in a Water Treatment Plant: Method and Case Study (2018)
Li, D., Chen, D., Jin, B., Shi, L., Goh, J., Ng, S.-K.: MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks, arXiv:1901.04997v1 [cs.LG], 15 January 2019
Goh, J., Adepu, S., Tan, M., Lee, Z.S.: Anomaly detection in cyber-physical systems using recurrent neural networks. In: Proceedings of HASE, pp. 140–145. IEEE (2017)
Malhotra, P., Vig, L., Shroff, G., Agarwal, P.: Long short term memory networks for anomaly detection in time series. In: Proceedings of ESANN, p. 89 (2015)
Goh, J., Adepu, S., Junejo, K.N., Mathur, A.: A dataset to support research in the design of secure water treatment systems. In: Havarneanu, G., Setola, R., Nassopoulos, H., Wolthusen, S. (eds.) CRITIS 2016. LNCS, vol. 10242, pp. 88–99. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-71368-7_8
Morita, T., et al.: Detection of cyber-attacks with zone dividing and PCA. In: The Proceedings of the 17th International Conference on Knowledge Based and Intelligent Information and Engineering Systems (2013)
Malhotra, P., Ramakrishnan, A., Anand, G., Vig, L., Agarwal, P., Shroff, G.: LSTM-based encoder-decoder for multi-sensor anomaly detection. In: ICML 2016 Anomaly Detection Workshop, New York, NY, USA (2016)
Filonov, P., Lavrentyev, A., Vorontsov, A.: Multivariate Industrial Time Series with Cyber-Attack Simulation: Fault Detection Using an LSTM-based Predictive Data Model, arXiv:1612.06676v2cs.LG], 26 December 2016
US National Institute of Standards and Technology. NIST cyber security framework, USA (2018)
Vincent, P., Larochelle, H., Lajoie, I., Bengio, Y., Manzagol, P.-A.: Stacked denoising autoencoders: learning useful representations in a deep network with a local denoising criterion. J. Mach. Learn. Res. 11, 3371–3408 (2010)
Adam, G., Bryan, H., See Kiong, N., Wee Siong, N.: Robustness of autoencoders for anomaly detection under adversarial impact. In: Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, (IJCAI 2020) (2020). https://doi.org/10.24963/ijcai.2020/173
Chen, Y., Zhou, X.S., Huang, T.S.: One-class SVM for learning in image retrieval. In: International Conference on Image Processing, pp. 34–37. Citeseer (2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Dutta, A.K., Negi, R., Shukla, S.K. (2021). Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems. In: Dolev, S., Margalit, O., Pinkas, B., Schwarzmann, A. (eds) Cyber Security Cryptography and Machine Learning. CSCML 2021. Lecture Notes in Computer Science(), vol 12716. Springer, Cham. https://doi.org/10.1007/978-3-030-78086-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-78086-9_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78085-2
Online ISBN: 978-3-030-78086-9
eBook Packages: Computer ScienceComputer Science (R0)