Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks

被引:205
作者
Kravchik, Moshe [1 ]
Shabtai, Asaf [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, Beer Sheva, Israel
来源
CPS-SPC'18: PROCEEDINGS OF THE 2018 WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY AND PRIVACY | 2018年
关键词
Anomaly detection; Industrial control systems; convolutional neural networks; PHYSICAL SYSTEMS;
D O I
10.1145/3264888.3264896
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents a study on detecting cyber attacks on industrial control systems (ICS) using convolutional neural networks. The study was performed on a Secure Water Treatment testbed (SWaT) dataset, which represents a scaled-down version of a real-world industrial water treatment plant. We suggest a method for anomaly detection based on measuring the statistical deviation of the predicted value from the observed value. We applied the proposed method by using a variety of deep neural network architectures including different variants of convolutional and recurrent networks. The test dataset included 36 different cyber attacks. The proposed method successfully detected 31 attacks with three false positives thus improving on previous research based on this dataset. The results of the study show that 1D convolutional networks can be successfully used for anomaly detection in industrial control systems and outperform recurrent networks in this setting. The findings also suggest that 1D convolutional networks are effective at time series prediction tasks which are traditionally considered to be best solved using recurrent neural networks. This observation is a promising one, as 1D convolutional neural networks are simpler, smaller, and faster than the recurrent neural networks.
引用
收藏
页码:72 / 83
页数:12
相关论文
共 49 条
[1]  
[Anonymous], 2017, CYB TARG SAF SYST SA
[2]  
[Anonymous], ARXIV150400941
[3]  
[Anonymous], 2016, Wired
[4]  
[Anonymous], 2016, Lecture Notes in Computer Science, DOI [10.1007/978-3-319-46493-0_38, DOI 10.1007/978-3-319-46493-0_38]
[5]  
[Anonymous], 1999, Unsupervised learning: foundations of neural computation
[6]   An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications [J].
Beaver, Justin M. ;
Borges-Hink, Raymond C. ;
Buckner, Mark. A. .
2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2, 2013, :54-59
[7]  
Cho K., 2014, ARXIV14061078, P1724, DOI 10.3115/V1/D14-1179
[8]  
Gao W., 2010, 2010 ECRIME RES SUMM, P1, DOI DOI 10.1109/ECRIME.2010.5706699
[9]   HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems [J].
Ghaeini, Hamid Reza ;
Tippenhauer, Nils Ole .
CPS-SPC'16: PROCEEDINGS OF THE 2ND ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY, 2016, :101-109
[10]   A Dataset to Support Research in the Design of Secure Water Treatment Systems [J].
Goh, Jonathan ;
Adepu, Sridhar ;
Junejo, Khurum Nazir ;
Mathur, Aditya .
CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2016), 2018, 10242 :88-99