ICS Anomaly Detection Based on Sensor Patterns and Actuator Rules in Spatiotemporal Dependency

被引:16
作者
Cai, Jun [1 ]
Wei, Zeheng [1 ]
Luo, Jianzhen [1 ]
机构
[1] Guangdong Polytech Normal Univ, Sch Cyber Secur, Guangzhou 510635, Peoples R China
关键词
Actuators; Anomaly detection; Topology; Spatiotemporal phenomena; Integrated circuit modeling; Graph neural networks; Data models; cyber-physical system (CPS); graph neural network (GNN); industrial control system; topology construction; NETWORK;
D O I
10.1109/TII.2024.3393528
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data-driven methods, such as deep learning, are widely adopted to detect cyberattacks for Industrial control systems (ICSs). Due to the neglect of entity spatial relationships (ESR), however, there is a potential discrepancy between the learned device topology and the real physical process. Meanwhile, existing methods confuse sensor patterns, actuator rules, and some interference within spatiotemporal dependence, suffering from undetected attack issue. To achieve precise detection without using design knowledge, we propose a sensor-actuator separated anomaly detection method (SA2) that distinguishes sensor patterns and actuator rules, constructing prediction models for sensors (PM-SEN) and actuators (PM-ACT) separately. Moreover, we propose an ESR-based topology construction method for providing process-conformed topology and an attack span-based evaluation method for validating the undetected attack issue. The experimental results show that SA2 outperforms all baselines in the F1 score, effectively detecting all attacks (zero undetected rate), compared to an optimal baseline with an undetected rate of close to 50%.
引用
收藏
页码:10647 / 10656
页数:10
相关论文
共 32 条
[1]   Distributed Attack Detection in a Water Treatment Plant: Method and Case Study [J].
Adepu, Sridhar ;
Mathur, Aditya .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) :86-99
[2]  
Ahmed C.M., 2017, P 3 INT WORKSH CYB P, P25
[3]   USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data [J].
Alsaedi, Abdullah ;
Tari, Zahir ;
Mahmud, Redowan ;
Moustafa, Nour ;
Mahmood, Abdun ;
Anwar, Adnan .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) :724-739
[4]   USAD : UnSupervised Anomaly Detection on Multivariate Time Series [J].
Audibert, Julien ;
Michiardi, Pietro ;
Guyard, Frederic ;
Marti, Sebastien ;
Zuluaga, Maria A. .
KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, :3395-3404
[5]   Ransomware: Recent advances, analysis, challenges and future research directions [J].
Beaman, Craig ;
Barkworth, Ashley ;
Akande, Toluwalope David ;
Hakak, Saqib ;
Khan, Muhammad Khurram .
COMPUTERS & SECURITY, 2021, 111
[6]  
Bronstein M. M., 2021, arXiv
[7]  
Chen WC, 2022, PR MACH LEARN RES
[8]   Learning Graph Structures With Transformer for Multivariate Time-Series Anomaly Detection in IoT [J].
Chen, Zekai ;
Chen, Dingshuo ;
Zhang, Xiao ;
Yuan, Zixuan ;
Cheng, Xiuzhen .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) :9179-9189
[9]   A Survey on Industrial Control System Testbeds and Datasets for Security Research [J].
Conti, Mauro ;
Donadel, Denis ;
Turrin, Federico .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (04) :2248-2294
[10]   A Multimodal Anomaly Detector for Robot-Assisted Feeding Using an LSTM-Based Variational Autoencoder [J].
Park, Daehyung ;
Hoshi, Yuuna ;
Kemp, Charles C. .
IEEE Robotics and Automation Letters, 2018, 3 (03) :1544-1551