A Hardware-in-the-Loop Water Distribution Testbed Dataset for Cyber-Physical Security Testing

被引:40
作者
Faramondi, L. [1 ]
Flammini, F. [2 ]
Guarino, S. [1 ]
Setola, R. [1 ]
机构
[1] Univ Campus Biomed Rome, Unit Automat Control, I-00128 Rome, Italy
[2] Malardalen Univ, Sch Innovat Design & Engn, S-63220 Eskilstuna, Sweden
关键词
Valves; Sensors; Integrated circuits; Solenoids; Reservoirs; Process control; Security; Artificial intelligence; cyber-physical systems; dataset; intrusion detection; machine learning; water distribution; security; testbed; threat recognition; NETWORK;
D O I
10.1109/ACCESS.2021.3109465
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a dataset to support researchers in the validation process of solutions such as Intrusion Detection Systems (IDS) based on artificial intelligence and machine learning techniques for the detection and categorization of threats in Cyber Physical Systems (CPS). To this end, data were acquired from a hardware-in-the-loop Water Distribution Testbed (WDT) which emulates water flowing between eight tanks via solenoid-valves, pumps, pressure and flow sensors. The testbed is composed of a real subsystem that is virtually connected to a simulated one. The proposed dataset encompasses both physical and network data in order to highlight the consequences of attacks in the physical process as well as in network traffic behaviour. Simulations data are organized in four different acquisitions for a total duration of 2 hours by considering normal scenario and multiple anomalies due to cyber and physical attacks.
引用
收藏
页码:122385 / 122396
页数:12
相关论文
共 40 条
  • [1] Applications of Wireless Sensor Networks in the Oil, Gas and Resources Industries
    Akhondi, Mohammad Reza
    Talevski, Alex
    Carlsen, Simon
    Petersen, Stig
    [J]. 2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 941 - 948
  • [2] Almseidin M, 2017, I S INTELL SYST INFO, P277, DOI 10.1109/SISY.2017.8080566
  • [3] [Anonymous], 2019, THREAT LANDSCAPE IND
  • [4] [Anonymous], MACH LEARN, DOI [10.1023/A:1010933404324, DOI 10.1023/A:1010933404324]
  • [5] Time is of the Essence: Machine Learning-based Intrusion Detection in Industrial Time Series Data
    Anton, Simon Duque
    Ahrens, Lia
    Fraunholz, Daniel
    Schotten, Hans D.
    [J]. 2018 18TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2018, : 1 - 6
  • [6] Antonioli Daniele, 2015, P 1 ACM WORKSH CYB P, P91
  • [7] Atilla O., 2016, PEERJ PREPRINTS, DOI 10.7287/peerj.preprints.1954v1
  • [8] Bernieri G., P 2019 IEEE INT S ME, P1, DOI DOI 10.1109/IWMN.2019.8805036
  • [9] Monitoring system reaction in cyber-physical testbed under cyber-attacks
    Bernieri, Giuseppe
    Miciolino, Estefania Etcheves
    Pascucci, Federica
    Setola, Roberto
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 86 - 98
  • [10] Cazorla L., 2018, IEEE SYSTEMS J, V12, P1778, DOI 10.1109/JSYST.2015.2487684