A multilayer perceptron model for anomaly detection in water treatment plants

被引:41
作者
Raman, Gauthama M. R. [1 ]
Somu, Nivethitha [2 ]
Mathur, A. P. [1 ,3 ]
机构
[1] Singapore Univ Technol & Design, iTrust Ctr Res Cyber Secur, Singapore, Singapore
[2] Indian Inst Technol, Smart Energy Informat Lab SEIL, Bombay, Maharashtra, India
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
基金
新加坡国家研究基金会;
关键词
Anomaly detection; Cyber physical systems; Cyber-attacks; Multi-layer perceptron neural network; Cumulative Sum; INTRUSION DETECTION; FEATURE-SELECTION; HYPERGRAPH; NETWORK;
D O I
10.1016/j.ijcip.2020.100393
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Early and accurate anomaly detection in critical infrastructure (CI), such as water treatment plants and electric power grid, is necessary to avoid plant damage and service disruption. Several machine learning techniques have been employed for the design of an effective anomaly detector in such systems. However, threats such as from insiders and state actors, introduce challenges in the design of an effective anomaly detector. This work presents a multi-layer perceptron (MLP) based anomaly detector that uses an unsupervised approach to safeguard CI from the adverse impacts of cyber-attacks. The proposed detector was trained using the data collected under the normal operation of the plant. The model captures the temporal dependencies between the samples and predicts the plant behavior. Further, the well-known CUmulative SUM (CUSUM) approach was used to detect the abnormal deviations between the observed and predicted sensor values for the identification and reporting of anomalies. Experimental validation of the proposed method was carried out using a dataset obtained from Secure Water Treatment (SWaT) an operational water treatment testbed under normal operation as well as under direct and stealthy attacks. The performance of MLP-CUSUM was compared against the state-of-the-art machine learning models in terms of its classification accuracy, precision, recall, Fl score, and the false alarm rate. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:15
相关论文
共 35 条
[1]   Distributed Attack Detection in a Water Treatment Plant: Method and Case Study [J].
Adepu, Sridhar ;
Mathur, Aditya .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) :86-99
[2]   Using Process Invariants to Detect Cyber Attacks on a Water Treatment System [J].
Adepu, Sridhar ;
Mathur, Aditya .
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 :91-104
[3]  
Ahmed Chuadhry Mujeeb, 2020, CPSS '20: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, P23, DOI 10.1145/3384941.3409588
[4]  
[Anonymous], 2015, RISI ONL INC DAT
[5]  
[Anonymous], 2020, ITRUST DAT
[6]  
[Anonymous], 2020, SEC WAT TREATM SWAT
[7]  
[Anonymous], 2011, Proceedings of the 6th ACM symposium on information, computer and communications security
[8]   Artificial neural networks: fundamentals, computing, design, and application [J].
Basheer, IA ;
Hajmeer, M .
JOURNAL OF MICROBIOLOGICAL METHODS, 2000, 43 (01) :3-31
[9]  
Filonov L.A., 2017, ICML 2017 TIM SER WO, P1
[10]   Anomaly Detection in Cyber Physical Systems using Recurrent Neural Networks [J].
Goh, Jonathan ;
Adepu, Sridhar ;
Tan, Marcus ;
Shan, Lee Zi .
2017 IEEE 18TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2017), 2017, :140-145