Comparative analysis of dimensionality reduction techniques for cybersecurity in the SWaT dataset

被引:3
作者
Bozdal, Mehmet [1 ]
Ileri, Kadir [2 ]
Ozkahraman, Ali [3 ]
机构
[1] Abdullah Gul Univ, Elect & Elect Engn Dept, Kayseri, Turkiye
[2] Bandirma Onyedi Eylul Univ, Elect & Elect Engn Dept, Balikesir, Turkiye
[3] Istanbul Tech Univ, Elect & Commun Engn Dept, Istanbul, Turkiye
关键词
Intrusion detection; Secure water treatment dataset; Convolutional neural networks; Dimensionality reduction; Gated recurrent unit;
D O I
10.1007/s11227-023-05511-w
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has revolutionized the functionality and efficiency of distributed cyber-physical systems, such as city-wide water treatment systems. However, the increased connectivity also exposes these systems to cybersecurity threats. This research presents a novel approach for securing the Secure Water Treatment (SWaT) dataset using a 1D Convolutional Neural Network (CNN) model enhanced with a Gated Recurrent Unit (GRU). The proposed method outperforms existing methods by achieving 99.68% accuracy and an F1 score of 98.69%. Additionally, the paper explores dimensionality reduction methods, including Autoencoders, Generalized Eigenvalue Decomposition (GED), and Principal Component Analysis (PCA). The research findings highlight the importance of balancing dimensionality reduction with the need for accurate intrusion detection. It is found that PCA provided better performance compared to the other techniques, as reducing the input dimension by 90.2% resulted in only a 2.8% and 2.6% decrease in the accuracy and F1 score, respectively. This study contributes to the field by addressing the critical need for robust cybersecurity measures in IoT-enabled water treatment systems, while also considering the practical trade-off between dimensionality reduction and intrusion detection accuracy.
引用
收藏
页码:1059 / 1079
页数:21
相关论文
共 26 条
  • [1] Abrams M., 2008, Malicious control system cyber security attack case study-maroochy water services, australia
  • [2] Distributed Attack Detection in a Water Treatment Plant: Method and Case Study
    Adepu, Sridhar
    Mathur, Aditya
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 86 - 99
  • [3] Detection of Cyber Attacks on a Water Treatment Process
    Al-Dhaheri, Mohammed
    Zhang, Ping
    Mikhaylenko, Dina
    [J]. IFAC PAPERSONLINE, 2022, 55 (06): : 667 - 672
  • [4] Supervised learning based intrusion detection for SCADA systems
    Alimi, Oyeniyi Akeem
    Ouahada, Khmaies
    Abu-Mahfouz, Adnan M.
    Rimer, Suvendi
    Alimi, Kuburat Oyeranti Adefemi
    [J]. 2022 IEEE NIGERIA 4TH INTERNATIONAL CONFERENCE ON DISRUPTIVE TECHNOLOGIES FOR SUSTAINABLE DEVELOPMENT (IEEE NIGERCON), 2022, : 141 - 145
  • [5] Anomaly Detection for a Water Treatment System Based on One-Class Neural Network
    Boateng, Emmanuel Aboah
    Bruce, J. W.
    Talbert, Douglas A.
    [J]. IEEE ACCESS, 2022, 10 : 115179 - 115191
  • [6] Anomaly detection in Industrial Control Systems using Logical Analysis of Data
    Das, Tanmoy Kanti
    Adepu, Sridhar
    Zhou, Jianying
    [J]. COMPUTERS & SECURITY, 2020, 96
  • [7] Di Pinto A., 2018, PROC BLACK HAT US, V2018, P1
  • [8] Electric S, 2023, IMP SEC NOT SEC NOT
  • [9] A Dual-Isolation-Forests-Based Attack Detection Framework for Industrial Control Systems
    Elnour, Mariam
    Meskin, Nader
    Khan, Khaled
    Jain, Raj
    [J]. IEEE ACCESS, 2020, 8 : 36639 - 36651
  • [10] Anomaly Detection in Cyber Physical Systems using Recurrent Neural Networks
    Goh, Jonathan
    Adepu, Sridhar
    Tan, Marcus
    Shan, Lee Zi
    [J]. 2017 IEEE 18TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2017), 2017, : 140 - 145