Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning

被引:228
作者
Inoue, Jun [1 ]
Yamagata, Yoriyuki [1 ]
Chen, Yuqi [2 ]
Poskitt, Christopher M. [2 ]
Sun, Jun [2 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Ikeda, Osaka, Japan
[2] Singapore Univ Technol & Design, Singapore, Singapore
来源
2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017) | 2017年
基金
新加坡国家研究基金会;
关键词
HYBRID; DIAGNOSIS; ATTACKS;
D O I
10.1109/ICDMW.2017.149
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose and evaluate the application of unsupervised machine learning to anomaly detection for a Cyber-Physical System (CPS). We compare two methods: Deep Neural Networks (DNN) adapted to time series data generated by a CPS, and one-class Support Vector Machines (SVM). These methods are evaluated against data from the Secure Water Treatment (SWaT) testbed, a scaled-down but fully operational raw water purification plant. For both methods, we first train detectors using a log generated by SWaT operating under normal conditions. Then, we evaluate the performance of both methods using a log generated by SWaT operating under 36 different attack scenarios. We find that our DNN generates fewer false positives than our one-class SVM while our SVM detects slightly more anomalies. Overall, our DNN has a slightly better F measure than our SVM. We discuss the characteristics of the DNN and one-class SVM used in this experiment, and compare the advantages and disadvantages of the two methods.
引用
收藏
页码:1058 / 1065
页数:8
相关论文
共 26 条
[1]   Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant [J].
Adepu, Sridhar ;
Mathur, Aditya .
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :449-460
[2]   Using Process Invariants to Detect Cyber Attacks on a Water Treatment System [J].
Adepu, Sridhar ;
Mathur, Aditya .
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 :91-104
[3]  
[Anonymous], 2013, Outlier Analysis, DOI [DOI 10.1007/978-1-4614-6396-2, 10.1007/978-1-4614-6396-2]
[4]  
[Anonymous], 2016, P ICML
[5]  
Bergstra J, 2012, J MACH LEARN RES, V13, P281
[6]   LOF: Identifying density-based local outliers [J].
Breunig, MM ;
Kriegel, HP ;
Ng, RT ;
Sander, J .
SIGMOD RECORD, 2000, 29 (02) :93-104
[7]   Anomaly Detection: A Survey [J].
Chandola, Varun ;
Banerjee, Arindam ;
Kumar, Vipin .
ACM COMPUTING SURVEYS, 2009, 41 (03)
[8]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[9]   Towards Learning and Verifying Invariants of Cyber-Physical Systems by Code Mutation [J].
Chen, Yuqi ;
Poskitt, Christopher M. ;
Sun, Jun .
FM 2016: FORMAL METHODS, 2016, 9995 :155-163
[10]  
Dietterich T. G., 2002, Structural, Syntactic, and Statistical Pattern Recognition. Joint IAPR International Workshops SSPR 2002 and SPR 2002 (Lecture Notes in Computer Science Vol. 2396), P15