Attack detection in water distribution systems using machine learning

被引:49
|
作者
Ramotsoela, Daniel T. [1 ]
Hancke, Gerhard P. [1 ,2 ]
Abu-Mahfouz, Adnan M. [1 ,3 ]
机构
[1] Univ Pretoria, Dept Elect Elect & Comp Engn, ZA-0002 Pretoria, South Africa
[2] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
[3] CSIR, ZA-0184 Pretoria, South Africa
来源
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES | 2019年 / 9卷
关键词
Anomaly detection; Machine learning; System security; Cyber-physical systems; Critical infrastructure; Water monitoring; ANOMALY DETECTION;
D O I
10.1186/s13673-019-0175-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The threat to critical water system infrastructure has increased in recent years as is evident from the increasing number of reported attacks against these systems. Preventative security mechanisms are often not enough to keep attackers out so a second layer of security in the form of intrusion detection is paramount in order to limit the damage of successful attacks. In this paper several traditional anomaly detection techniques are evaluated in the context of attack detection in water distribution systems. These algorithms were centrally trained on the entire feature space and compared to multi-stage detection techniques that were designed to isolate both local and global anomalies. A novel ensemble technique that combines density-based and parametric algorithms was also developed and tested in the application environment. The traditional techniques had comparable results to the multi-stage systems and when used in conjunction with a local anomaly detector the performances of these algorithms were greatly improved. The developed ensemble technique also had promising results outperforming the density-based techniques and having comparable results to the parametric algorithms.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] Machine Learning Anomaly Detection in Large Systems
    Murphree, Jerry
    2016 IEEE AUTOTESTCON PROCEEDINGS, 2016,
  • [22] Leakage detection in water distribution networks using machine-learning strategies
    Sousa, Diego
    Du, Rong
    da Silva Jr, Jose Mairton Barros
    Cavalcante, Charles Casimiro
    Fischione, Carlo
    WATER SUPPLY, 2023, 23 (03) : 1115 - 1126
  • [23] Anomaly Detection in Biological Early Warning Systems Using Unsupervised Machine Learning
    Grekov, Aleksandr N.
    Kabanov, Aleksey A.
    Vyshkvarkova, Elena V.
    Trusevich, Valeriy V.
    SENSORS, 2023, 23 (05)
  • [24] DDoS attack detection in ISP domain using machine learning
    Sahu, Swati
    Verma, Amit
    2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,
  • [25] DDoS Attack Detection and Mitigation in SDN using Machine Learning
    Khashab, Fatima
    Moubarak, Joanna
    Feghali, Antoine
    Bassil, Carole
    PROCEEDINGS OF THE 2021 IEEE 7TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2021): ACCELERATING NETWORK SOFTWARIZATION IN THE COGNITIVE AGE, 2021, : 395 - 401
  • [26] Detection of adversarial phishing attack using machine learning techniques
    Sudar, K. Muthamil
    Rohan, M.
    Vignesh, K.
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (03):
  • [27] An Approach to Feature Selection in Intrusion Detection Systems Using Machine Learning Algorithms
    Kavitha, G.
    Elango, N. M.
    INTERNATIONAL JOURNAL OF E-COLLABORATION, 2020, 16 (04) : 48 - 58
  • [28] Detection of Cyber Attacks on Voltage Regulation in Distribution Systems Using Machine Learning
    Bhusal, Narayan
    Gautam, Mukesh
    Benidris, Mohammed
    IEEE ACCESS, 2021, 9 : 40402 - 40416
  • [29] Cybersecurity Attack Detection Model, Using Machine Learning Techniques
    Avci, Isa
    Koca, Murat
    ACTA POLYTECHNICA HUNGARICA, 2023, 20 (07) : 29 - 44
  • [30] Water Distribution Systems Analysis Symposium-Battle of the Attack Detection Algorithms (BATADAL)
    Aghashahi, Mohsen
    Sundararajan, Raanju
    Pourahmadi, Mohsen
    Banks, M. Katherine
    WORLD ENVIRONMENTAL AND WATER RESOURCES CONGRESS 2017: INTERNATIONAL PERSPECTIVES, HISTORY AND HERITAGE, EMERGING TECHNOLOGIES, AND STUDENT PAPERS, 2017, : 101 - 108