An anomaly-based approach for cyber-physical threat detection using network and sensor data

被引:1
作者
Canonico, Roberto [1 ]
Esposito, Giovanni [1 ]
Navarro, Annalisa [1 ]
Romano, Simon Pietro [1 ]
Sperli, Giancarlo [1 ]
Vignali, Andrea [1 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol DIETI, Via Claudio 21, Naples, Italy
关键词
Threat detection; Anomaly detection; Unsupervised learning; ICS; CPS; SYSTEMS; SECURITY;
D O I
10.1016/j.comcom.2025.108087
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Integrating physical and cyber realms, Cyber-Physical Systems (CPSs) expand the potential attack surface for intruders. Given their deployment in critical infrastructures like Industrial Control Systems (ICSs), ensuring robust security is imperative. Current research has developed various Intrusion Detection techniques to identify and counter malicious activities. However, traditional methods often encounter challenges in detecting several attack types due to reliance on a single data source such as time series data from sensors and actuators. In this study, we meticulously design advanced Deep Learning (DL) anomaly-based techniques trained on either sensor/actuator data or network traffic statistics in an unsupervised setting. We evaluate these techniques on network and physical data collected concurrently from a real-world CPS. Through meticulous hyperparameter tuning, we identify the optimal parameters for each model and compare their efficiency and effectiveness in detecting different types of attacks. In addition to demonstrating superior performance compared to various baselines, we showcase the best model for each data source. Eventually, we show how utilizing diverse data sources can enhance cyber-threat detection, recognizing different kinds of attacks.
引用
收藏
页数:14
相关论文
共 51 条
[1]   Deep learning-enabled anomaly detection for IoT systems [J].
Abusitta, Adel ;
de Carvalho, Glaucio H. S. ;
Wahab, Omar Abdel ;
Halabi, Talal ;
Fung, Benjamin C. M. ;
Al Mamoori, Saja .
INTERNET OF THINGS, 2023, 21
[2]   Methodology to Determine the Device-Level Periodicity for Anomaly Detection in EtherCAT-Based Industrial Control Network [J].
Akpinar, Kevser Ovaz ;
Ozcelik, Ibrahim .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02) :2308-2319
[3]   Critical Attacks Set Identification in Attack Graphs for Computer and SCADA/ICS Networks [J].
Al Ghazo, Alaa T. ;
Kumar, Ratnesh .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (09) :5604-5613
[4]   An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System [J].
Al-Abassi, Abdulrahman ;
Karimipour, Hadis ;
Dehghantanha, Ali ;
Parizi, Reza M. .
IEEE ACCESS, 2020, 8 :83965-83973
[5]   SCADA vulnerabilities and attacks: A review of the state-of-the-art and open issues [J].
Alanazi, Manar ;
Mahmood, Abdun ;
Chowdhury, Mohammad Jabed Morshed .
COMPUTERS & SECURITY, 2023, 125
[6]  
Alguliyev R., 2022, 2022 IEEE 16 INT C A, P1, DOI [10.1109/AICT55583.2022.10013581, DOI 10.1109/AICT55583.2022.10013581]
[7]   USAD : UnSupervised Anomaly Detection on Multivariate Time Series [J].
Audibert, Julien ;
Michiardi, Pietro ;
Guyard, Frederic ;
Marti, Sebastien ;
Zuluaga, Maria A. .
KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, :3395-3404
[8]   Forensic readiness of industrial control systems under stealthy attacks [J].
Azzam, Mazen ;
Pasquale, Liliana ;
Provan, Gregory ;
Nuseibeh, Bashar .
COMPUTERS & SECURITY, 2023, 125
[9]  
Bahlali Ahmed Ramzi, 2023, Advanced Information Networking and Applications: Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023). Lecture Notes in Networks and Systems (654), P392, DOI 10.1007/978-3-031-28451-9_34
[10]   Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems [J].
Barrere, Martin ;
Hankin, Chris ;
O'Reilly, Dean .
COMPUTERS & SECURITY, 2023, 132