Detecting Anomalies by using Self-Organizing Maps in Industrial Environments

被引:7
作者
Hormann, Ricardo [1 ]
Fischer, Eric [1 ]
机构
[1] Volkswagen AG, Shopfloor IT, Wolfsburg, Germany
来源
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP) | 2019年
关键词
Anomaly Detection; Self-Organizing Maps; Profinet;
D O I
10.5220/0007364803360344
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting anomalies caused by intruders are a big challenge in industrial environments due to the complex environmental interdependencies and proprietary fieldbus protocols. In this paper, we proposed a network-based method for detecting anomalies by using unsupervised artificial neural networks called Self-Organizing Maps (SOMs). Therefore, we published an algorithm which identifies clusters and cluster centroids in SOMs to gain knowledge about the underlying data structure. In the training phase we created two neural networks, one for clustering the network data and the other one for finding the cluster centroids. In the operating phase our approach is able to detect anomalies by comparing new data samples with the first trained SOM model. We used a confidence interval to decide if the sample is too far from its best matching unit. A novel additional confidence interval for the second SOM is proposed to minimize false positives which have been a major drawback of machine learning methods in anomaly detection. We implemented our approach in a robot cell and infiltrated the network like an intruder would do to evaluate our method. As a result, we significantly reduced the false positive rate to 0.07% using the second interval while providing an accuracy of 99% for the detection of network attacks.
引用
收藏
页码:336 / 344
页数:9
相关论文
共 29 条
[1]  
[Anonymous], 2011, LEADING ISSUES INFOR
[2]  
Baçao F, 2005, LECT NOTES COMPUT SC, V3516, P476
[3]   Anomaly Detection Based on Confidence Intervals Using SOM with an Application to Health Monitoring [J].
Bellas, Anastasios ;
Bouveyron, Charles ;
Cottrell, Marie ;
Lacaille, Jerome .
ADVANCES IN SELF-ORGANIZING MAPS AND LEARNING VECTOR QUANTIZATION, 2014, 295 :145-155
[4]   Automatic cluster detection in Kohonen's SO-M [J].
Brugger, Dominik ;
Bogdan, Martin ;
Rosenstiel, Wolfgang .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 2008, 19 (03) :442-459
[5]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[6]  
Di Pietro Roberto., 2008, Advances In Information Security: Intrusion Detection Systems
[7]   WannaCry, Cybersecurity and Health Information Technology: A Time to Act [J].
Ehrenfeld, Jesse M. .
JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (07)
[8]  
Frank H., 2009, IND KOMMUNIKATION PR
[9]   A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data [J].
Goldstein, Markus ;
Uchida, Seiichi .
PLOS ONE, 2016, 11 (04)
[10]   Parsing and Extracting Features from OPC Unified Architecture in Industrial Environments [J].
Hormann, Ricardo ;
Nikelski, Sebastian ;
Dukanovic, Sinisa ;
Fischer, Eric .
ISCSIC'18: PROCEEDINGS OF THE 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROL, 2018,