A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT

被引:109
作者
Aboelwafa, Mariam M. N. [1 ]
Seddik, Karim G. [1 ]
Eldefrawy, Mohamed H. [2 ]
Gadallah, Yasser [1 ]
Gidlund, Mikael [3 ]
机构
[1] Amer Univ Cairo, Elect & Commun Engn Dept, New Cairo 11835, Egypt
[2] Halmstad Univ, Sch Informat Technol, S-30118 Halmstad, Sweden
[3] Mid Sweden Univ, Dept Informat Syst & Technol, S-85170 Sundsvall, Sweden
来源
IEEE INTERNET OF THINGS JOURNAL | 2020年 / 7卷 / 09期
关键词
Correlation; Support vector machines; Security; Training; Noise reduction; Feature extraction; Autoencoders (AEs); false data injection (FDI) attacks; Industrial Internet-of-Things (IIoT) security; machine learning (ML); support vector machine (SVM); NETWORK;
D O I
10.1109/JIOT.2020.2991693
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The accelerated move toward the adoption of the Industrial Internet-of-Things (IIoT) paradigm has resulted in numerous shortcomings as far as security is concerned. One of the IIoT affecting critical security threats is what is termed as the false data injection (FDI) attack. The FDI attacks aim to mislead the industrial platforms by falsifying their sensor measurements. FDI attacks have successfully overcome the classical threat detection approaches. In this article, we present a novel method of FDI attack detection using autoencoders (AEs). We exploit the sensor data correlation in time and space, which in turn can help identify the falsified data. Moreover, the falsified data are cleaned using the denoising AEs (DAEs). Performance evaluation proves the success of our technique in detecting FDI attacks. It also significantly outperforms a support vector machine (SVM)-based approach used for the same purpose. The DAE data cleaning algorithm is also shown to be very effective in recovering clean data from corrupted (attacked) data.
引用
收藏
页码:8462 / 8471
页数:10
相关论文
共 25 条
[1]  
Abdiansah A., 2015, INT J COMPUT APPL, V128, P28, DOI [10.5120/ijca2015906480, DOI 10.5120/IJCA2015906480]
[2]   Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection [J].
Al-Qatf, Majjed ;
Yu Lasheng ;
Al-Habib, Mohammed ;
Al-Sabahi, Kamal .
IEEE ACCESS, 2018, 6 :52843-52856
[3]  
[Anonymous], 2014, Convex Optimiza- tion
[4]  
[Anonymous], 2008, P 25 INT C MACHINE L
[5]   Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements [J].
Anwar, Adnan ;
Mahmood, Abdun Naser ;
Pickering, Mark .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 83 (01) :58-72
[6]  
Apruzzese G, 2018, INT CONF CYBER CONFL, P371, DOI 10.23919/CYCON.2018.8405026
[7]   Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation [J].
Ashok, Aditya ;
Govindarasu, Manimaran ;
Ajjarapu, Venkataramana .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (03) :1636-1646
[8]   Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid [J].
Esmalifalak, Mohammad ;
Liu, Lanchao ;
Nguyen, Nam ;
Zheng, Rong ;
Han, Zhu .
IEEE SYSTEMS JOURNAL, 2017, 11 (03) :1644-1652
[9]  
Forsström S, 2018, 2018 IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR INDUSTRY 4.0 AND IOT (METROIND4.0&IOT), P218, DOI 10.1109/METROI4.2018.8428344
[10]  
Helwig N, 2015, IEEE IMTC P, P210, DOI 10.1109/I2MTC.2015.7151267