Real-Time Identification of Cyber-Physical Attacks on Water Distribution Systems via Machine Learning-Based Anomaly Detection Techniques

被引:52
作者
Abokifa, Ahmed A. [1 ]
Haddad, Kelsey [1 ]
Lo, Cynthia [1 ]
Biswas, Pratim [1 ]
机构
[1] Washington Univ, Dept Energy Environm & Chem Engn, 1 Brookings Dr, St Louis, MO 63130 USA
关键词
EVENT DETECTION; FAULT-DETECTION; QUALITY; STRATEGIES;
D O I
10.1061/(ASCE)WR.1943-5452.0001023
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Smart water infrastructures are prone to cyber-physical attacks that can disrupt their operations or damage their assets. An algorithm was developed to identify suspicious behaviors in the different cyber-physical components of a smart water distribution system. The algorithm incorporated multiple modules of anomaly-detection techniques to recognize different types of anomalies in the real-time monitoring and control data. Trained artificial neural networks were used to detect unusual patterns that do not conform to normal operational behavior. Principal component analysis was conducted to decompose the high-dimensional space occupied by the sensory data to uncover global anomalies. The algorithm was trained using a historical data set of trusted observations and tested against a validation and a test data set, both featuring a group of simulated attack scenarios. The proposed approach successfully identified all the attacks featured in the Battle of the Attack Detection Algorithms (BATADAL) data sets with high sensitivity and specificity. Nevertheless, the performance was sensitive to high background noise in the sensory data. (C) 2018 American Society of Civil Engineers.
引用
收藏
页数:13
相关论文
共 46 条
[1]  
Abokifa AA, 2017, WORLD ENVIRONMENTAL AND WATER RESOURCES CONGRESS 2017: HYDRAULICS AND WATERWAYS AND WATER DISTRIBUTION SYSTEMS ANALYSIS, P676
[2]   Water quality modeling in the dead end sections of drinking water distribution networks [J].
Abokifa, Ahmed A. ;
Yang, Y. Jeffrey ;
Lo, Cynthia S. ;
Biswas, Pratim .
WATER RESEARCH, 2016, 89 :107-117
[3]   An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems [J].
Almalawi, Abdulmohsen ;
Fahad, Adil ;
Tari, Zahir ;
Alamri, Abdullah ;
AlGhamdi, Rayed ;
Zomaya, Albert Y. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) :893-906
[4]   Cyber Security of Water SCADA Systems-Part II: Attack Detection Using Enhanced Hydrodynamic Models [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, S. Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1679-1693
[5]   Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1963-1970
[6]  
[Anonymous], 2007, ADV NEURAL INFORM PR
[7]  
[Anonymous], 2017, P 3 INT WORKSH CYB P, DOI DOI 10.1145/3055366.3055376
[8]  
[Anonymous], 2011, J. Mach. Learn. Technol
[9]   A dynamic thresholds scheme for contaminant event detection in water distribution systems [J].
Arad, Jonathan ;
Housh, Mashor ;
Perelman, Lina ;
Ostfeld, Avi .
WATER RESEARCH, 2013, 47 (05) :1899-1908
[10]   Optimal Operation of Complex Water Distribution Systems Using Metamodels [J].
Broad, D. R. ;
Maier, H. R. ;
Dandy, G. C. .
JOURNAL OF WATER RESOURCES PLANNING AND MANAGEMENT-ASCE, 2010, 136 (04) :433-443