Prediction of Industrial Cyber Attacks Using Normalizing Flows

被引:0
|
作者
V. P. Stepashkina [1 ]
M. I. Hushchyn [1 ]
机构
[1] HSE University, Moscow
关键词
anomaly detection; cyber attacks; cyber security; cyber-physical systems; generative models; machine learning; neural networks; time series;
D O I
10.1134/S1064562424602269
中图分类号
学科分类号
摘要
Abstract: This paper presents the development and evaluation of methods for detecting cyberattacks on industrial systems using neural network approaches. The focus is on the task of detecting anomalies in multivariate time series, where the diversity and complexity of potential attack scenarios require the use of advanced models. To address these challenges, a transformer-based autoencoder architecture was used, which was further enhanced by transitioning to a variational autoencoder (VAE) and integrating normalizing flows. These modifications allowed the model to better capture the data distribution, enabling effective anomaly detection, including those not present in the training set. As a result, high performance was achieved, with an F1 score of 0.93 and a ROC-AUC of 0.87. The results underscore the effectiveness of the proposed methodology and provide valuable contributions to the field of anomaly detection and cybersecurity in industrial systems. © Pleiades Publishing, Ltd. 2024.
引用
收藏
页码:S95 / S102
页数:7
相关论文
共 50 条
  • [41] Cyber Attacks on Protective Relays in Digital Substations and Impact Analysis
    Rajkumar, Vetrivel Subramaniam
    Tealane, Marko
    Stefanov, Alexandru
    Palensky, Peter
    2020 8TH WORKSHOP ON MODELING AND SIMULATION OF CYBER-PHYSICAL ENERGY SYSTEMS, 2020,
  • [42] Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems
    Miller, Thomas
    Staves, Alexander
    Maesschalck, Sam
    Sturdee, Miriam
    Green, Benjamin
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2021, 35
  • [43] An Empirical Study on Automotive Cyber Attacks
    Singh, Aman
    Singh, Madhusudan
    2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2018, : 47 - 50
  • [45] Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks
    Bossler, Adam M.
    AMERICAN JOURNAL OF CRIMINAL JUSTICE, 2021, 46 (06) : 911 - 934
  • [46] Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks
    Adam M. Bossler
    American Journal of Criminal Justice, 2021, 46 : 911 - 934
  • [47] Detecting Cyber Security Attacks against a Microservices Application using Distributed Tracing
    Jacob, Stephen
    Qiao, Yuansong
    Lee, Brian
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 588 - 595
  • [48] Detecting Cyber Attacks In-Vehicle Diagnostics Using an Intelligent Multistage Framework
    Awaad, Tasneem A.
    El-Kharashi, Mohamed Watheq
    Taher, Mohamed
    Tawfik, Ayman
    Yu, Keping
    Chakraborty, Chinmay
    SENSORS, 2023, 23 (18)
  • [49] Anomaly detection in cyber security attacks on networks using MLP deep learning
    Teoh, T. T.
    Chiew, Graeme
    Franco, Edwin J.
    Ng, P. C.
    Benjamin, M. P.
    Goh, Y. J.
    2018 INTERNATIONAL CONFERENCE ON SMART COMPUTING AND ELECTRONIC ENTERPRISE (ICSCEE), 2018,
  • [50] Multi-Source Cyber-Attacks Detection using Machine Learning
    Taheri, Sona
    Gondal, Iqbal
    Bagirov, Adil
    Harkness, Greg
    Brown, Simon
    Chi, CHihung
    2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2019, : 1167 - 1172