Federated Learning-Based Explainable Anomaly Detection for Industrial Control Systems

被引:40
作者
Huong, Truong Thu [1 ]
Bac, Ta Phuong [2 ]
Ha, Kieu Ngan [1 ]
Hoang, Nguyen Viet [1 ]
Hoang, Nguyen Xuan [1 ]
Hung, Nguyen Tai [1 ]
Tran, Kim Phuc [3 ]
机构
[1] Hanoi Univ Sci & Technol, Sch Elect & Elect Engn, Hanoi 100000, Hai Ba Trung, Vietnam
[2] Soongsil Univ, Sch Elect Engn, Seoul 06978, South Korea
[3] Univ Lille, Natl Higher Sch Arts & Text Ind ENSAIT, Genie & Mat Text GEMTEX, F-59000 Lille, France
关键词
Anomaly detection; Integrated circuits; Training; Industrial Internet of Things; Computational modeling; Support vector machines; Edge computing; ICS; federated learning; XAI; VAE; SVDD; CYBERATTACKS;
D O I
10.1109/ACCESS.2022.3173288
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We are now witnessing the rapid growth of advanced technologies and their application, leading to Smart Manufacturing (SM). The Internet of Things (IoT) is one of the main technologies used to enable smart factories, which is connecting all industrial assets, including machines and control systems, with the information systems and the business processes. Industrial Control Systems of smart IoT-based factories are one of the top industries attacked by numerous threats, especially unknown and novel attacks. As a result, with the distributed structure of plenty of IoT front-end sensing devices in SM, an effectively distributed anomaly detection (AD) architecture for IoT-based ICSs should: achieve high detection performance, train and learn new data patterns in a fast time scale, and have lightweight to be deployed on resource-constrained edge devices. To date, most solutions for anomaly detection have not fulfilled all of these requirements. In addition, the interpretability of why an instance is predicted to be abnormal is hardly concerned. In this paper, we propose the so- called FedeX architecture to address those challenges. The experiments show that FedeX outperforms 14 other existing anomaly detection solutions on all detection metrics with the liquid storage data set. And with Recall of 1 and F1-score of 0.9857, it also outperforms those solutions on the SWAT data set. FedeX is also proven to be fast in terms of training time of about 7.5 minutes and lightweight in terms of hardware requirement with memory consumption of 14%, allowing us to deploy anomaly detection tasks on top of edge computing infrastructure and in real-time. Besides, FedeX is considered as one of the frameworks at the forefront of interpreting the predicted anomalies by using XAI, which enables experts to make quick decisions and trust the model more.
引用
收藏
页码:53854 / 53872
页数:19
相关论文
共 30 条
[1]   A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond [J].
AbdulRahman, Sawsan ;
Tout, Hanine ;
Ould-Slimane, Hakima ;
Mourad, Azzam ;
Talhi, Chamseddine ;
Guizani, Mohsen .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5476-5497
[2]   An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System [J].
Al-Abassi, Abdulrahman ;
Karimipour, Hadis ;
Dehghantanha, Ali ;
Parizi, Reza M. .
IEEE ACCESS, 2020, 8 :83965-83973
[3]  
Amarasinghe K, 2018, C HUM SYST INTERACT, P311, DOI 10.1109/HSI.2018.8430788
[4]   Anomaly Detection for Industrial Control Systems Using K-Means and Convolutional Autoencoder [J].
Chang, Chun-Pi ;
Hsu, Wen-Chiao ;
Liao, I-En .
2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2019, :136-141
[5]   Anomaly detection in Industrial Control Systems using Logical Analysis of Data [J].
Das, Tanmoy Kanti ;
Adepu, Sridhar ;
Zhou, Jianying .
COMPUTERS & SECURITY, 2020, 96
[6]   State-Aware Anomaly Detection for Industrial Control Systems [J].
Ghaeini, Hamid Reza ;
Antonioli, Daniele ;
Brasser, Ferdinand ;
Sadeghi, Ahmad-Reza ;
Tippenhauer, Nils Ole .
33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, :1620-1628
[7]   A Dataset to Support Research in the Design of Secure Water Treatment Systems [J].
Goh, Jonathan ;
Adepu, Sridhar ;
Junejo, Khurum Nazir ;
Mathur, Aditya .
CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2016), 2018, 10242 :88-99
[8]   A survey on internet of things security: Requirements, challenges, and solutions [J].
HaddadPajouh, Hamed ;
Dehghantanha, Ali ;
Parizi, Reza M. ;
Aledhari, Mohammed ;
Karimipour, Hadis .
INTERNET OF THINGS, 2021, 14
[9]  
Hindy Hanan, 2019, Computer Security. ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018. Revised Selected Papers: Lecture Notes in Computer Science (LNCS 11387), P3, DOI 10.1007/978-3-030-12786-2_1
[10]   Detecting cyberattacks using anomaly detection in industrial control systems: A Federated Learning approach [J].
Huong, Truong Thu ;
Bac, Ta Phuong ;
Long, Dao Minh ;
Luong, Tran Duc ;
Dan, Nguyen Minh ;
Quang, Le Anh ;
Cong, Le Thanh ;
Thang, Bui Doan ;
Tran, Kim Phuc .
COMPUTERS IN INDUSTRY, 2021, 132 (132)