A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT

被引:100
作者
Aboelwafa, Mariam M. N. [1 ]
Seddik, Karim G. [1 ]
Eldefrawy, Mohamed H. [2 ]
Gadallah, Yasser [1 ]
Gidlund, Mikael [3 ]
机构
[1] Amer Univ Cairo, Elect & Commun Engn Dept, New Cairo 11835, Egypt
[2] Halmstad Univ, Sch Informat Technol, S-30118 Halmstad, Sweden
[3] Mid Sweden Univ, Dept Informat Syst & Technol, S-85170 Sundsvall, Sweden
来源
IEEE INTERNET OF THINGS JOURNAL | 2020年 / 7卷 / 09期
关键词
Correlation; Support vector machines; Security; Training; Noise reduction; Feature extraction; Autoencoders (AEs); false data injection (FDI) attacks; Industrial Internet-of-Things (IIoT) security; machine learning (ML); support vector machine (SVM); NETWORK;
D O I
10.1109/JIOT.2020.2991693
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The accelerated move toward the adoption of the Industrial Internet-of-Things (IIoT) paradigm has resulted in numerous shortcomings as far as security is concerned. One of the IIoT affecting critical security threats is what is termed as the false data injection (FDI) attack. The FDI attacks aim to mislead the industrial platforms by falsifying their sensor measurements. FDI attacks have successfully overcome the classical threat detection approaches. In this article, we present a novel method of FDI attack detection using autoencoders (AEs). We exploit the sensor data correlation in time and space, which in turn can help identify the falsified data. Moreover, the falsified data are cleaned using the denoising AEs (DAEs). Performance evaluation proves the success of our technique in detecting FDI attacks. It also significantly outperforms a support vector machine (SVM)-based approach used for the same purpose. The DAE data cleaning algorithm is also shown to be very effective in recovering clean data from corrupted (attacked) data.
引用
收藏
页码:8462 / 8471
页数:10
相关论文
共 25 条
  • [1] Abdiansah A, 2015, Int. J. Comput. Appl., V128, P28
  • [2] Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection
    Al-Qatf, Majjed
    Yu Lasheng
    Al-Habib, Mohammed
    Al-Sabahi, Kamal
    [J]. IEEE ACCESS, 2018, 6 : 52843 - 52856
  • [3] Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements
    Anwar, Adnan
    Mahmood, Abdun Naser
    Pickering, Mark
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 83 (01) : 58 - 72
  • [4] Apruzzese G, 2018, INT CONF CYBER CONFL, P371, DOI 10.23919/CYCON.2018.8405026
  • [5] Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation
    Ashok, Aditya
    Govindarasu, Manimaran
    Ajjarapu, Venkataramana
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (03) : 1636 - 1646
  • [6] Boyd S., 2004, CONVEX OPTIMIZATION
  • [7] Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid
    Esmalifalak, Mohammad
    Liu, Lanchao
    Nguyen, Nam
    Zheng, Rong
    Han, Zhu
    [J]. IEEE SYSTEMS JOURNAL, 2017, 11 (03): : 1644 - 1652
  • [8] Forsström S, 2018, 2018 IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR INDUSTRY 4.0 AND IOT (METROIND4.0&IOT), P218, DOI 10.1109/METROI4.2018.8428344
  • [9] Helwig N, 2015, IEEE IMTC P, P210, DOI 10.1109/I2MTC.2015.7151267
  • [10] Irsoy O., 2016, AS C MACH LEARN, P378