A Comparative Study of Time Series Anomaly Detection Models for Industrial Control Systems

被引:50
作者
Kim, Bedeuro [1 ]
Alawami, Mohsen Ali [1 ]
Kim, Eunsoo [1 ]
Oh, Sanghak [1 ]
Park, Jeongyong [2 ]
Kim, Hyoungshick [1 ]
机构
[1] Sungkyunkwan Univ, Dept Elect & Comp Engn, 2066 Seobu Ro, Suwon 16419, Gyeonggi Do, South Korea
[2] Sungkyunkwan Univ, Dept Comp Sci & Engn, 2066 Seobu Ro, Suwon 16419, Gyeonggi Do, South Korea
关键词
anomaly detection; intrusion detection systems; industrial control systems; deep learning model; unsupervised learning; CYBER-PHYSICAL SYSTEMS; INTRUSION DETECTION; SECURITY; CHALLENGES; ISSUES;
D O I
10.3390/s23031310
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Anomaly detection has been known as an effective technique to detect faults or cyber-attacks in industrial control systems (ICS). Therefore, many anomaly detection models have been proposed for ICS. However, most models have been implemented and evaluated under specific circumstances, which leads to confusion about choosing the best model in a real-world situation. In other words, there still needs to be a comprehensive comparison of state-of-the-art anomaly detection models with common experimental configurations. To address this problem, we conduct a comparative study of five representative time series anomaly detection models: InterFusion, RANSynCoder, GDN, LSTM-ED, and USAD. We specifically compare the performance analysis of the models in detection accuracy, training, and testing times with two publicly available datasets: SWaT and HAI. The experimental results show that the best model results are inconsistent with the datasets. For SWaT, InterFusion achieves the highest F1-score of 90.7% while RANSynCoder achieves the highest F1-score of 82.9% for HAI. We also investigate the effects of the training set size on the performance of anomaly detection models. We found that about 40% of the entire training set would be sufficient to build a model producing a similar performance compared to using the entire training set.
引用
收藏
页数:21
相关论文
共 64 条
[1]   Practical Approach to Asynchronous Multivariate Time Series Anomaly Detection and Localization [J].
Abdulaal, Ahmed ;
Liu, Zhuanghua ;
Lancewicki, Tomer .
KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, :2485-2494
[2]   NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems [J].
Ahmed, Chuadhry Mujeeb ;
Ochoa, Martin ;
Zhou, Jianying ;
Mathur, Aditya P. ;
Qadeer, Rizwan ;
Murguia, Carlos ;
Ruths, Justin .
PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, :483-497
[3]   Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices [J].
Altawy, Ham ;
Youssef, Amr M. .
IEEE ACCESS, 2016, 4 :959-979
[4]  
Audibert J., 2020, P ACM SIGKDD INT C K
[5]  
Barbieri G, 2021, Arxiv, DOI arXiv:2007.01114
[6]   A Review on Outlier/Anomaly Detection in Time Series Data [J].
Blazquez-Garcia, Ane ;
Conde, Angel ;
Mori, Usue ;
Lozano, Jose A. .
ACM COMPUTING SURVEYS, 2022, 54 (03)
[7]  
Borges H., 2021, IEEE T KNOWL DATA EN, V54, P1
[8]   Bagging predictors [J].
Breiman, L .
MACHINE LEARNING, 1996, 24 (02) :123-140
[9]   A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems [J].
Carcano, A. ;
Coletta, A. ;
Guglielmi, M. ;
Masera, M. ;
Fovino, I. Nai ;
Trombetta, A. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2011, 7 (02) :179-186
[10]  
Chen T., 2015, XGBOOST EXTREME GRAD