Federated Learning-Based Explainable Anomaly Detection for Industrial Control Systems

被引:30
作者
Huong, Truong Thu [1 ]
Bac, Ta Phuong [2 ]
Ha, Kieu Ngan [1 ]
Hoang, Nguyen Viet [1 ]
Hoang, Nguyen Xuan [1 ]
Hung, Nguyen Tai [1 ]
Tran, Kim Phuc [3 ]
机构
[1] Hanoi Univ Sci & Technol, Sch Elect & Elect Engn, Hanoi 100000, Hai Ba Trung, Vietnam
[2] Soongsil Univ, Sch Elect Engn, Seoul 06978, South Korea
[3] Univ Lille, Natl Higher Sch Arts & Text Ind ENSAIT, Genie & Mat Text GEMTEX, F-59000 Lille, France
来源
IEEE ACCESS | 2022年 / 10卷
关键词
Anomaly detection; Integrated circuits; Training; Industrial Internet of Things; Computational modeling; Support vector machines; Edge computing; ICS; federated learning; XAI; VAE; SVDD; CYBERATTACKS;
D O I
10.1109/ACCESS.2022.3173288
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We are now witnessing the rapid growth of advanced technologies and their application, leading to Smart Manufacturing (SM). The Internet of Things (IoT) is one of the main technologies used to enable smart factories, which is connecting all industrial assets, including machines and control systems, with the information systems and the business processes. Industrial Control Systems of smart IoT-based factories are one of the top industries attacked by numerous threats, especially unknown and novel attacks. As a result, with the distributed structure of plenty of IoT front-end sensing devices in SM, an effectively distributed anomaly detection (AD) architecture for IoT-based ICSs should: achieve high detection performance, train and learn new data patterns in a fast time scale, and have lightweight to be deployed on resource-constrained edge devices. To date, most solutions for anomaly detection have not fulfilled all of these requirements. In addition, the interpretability of why an instance is predicted to be abnormal is hardly concerned. In this paper, we propose the so- called FedeX architecture to address those challenges. The experiments show that FedeX outperforms 14 other existing anomaly detection solutions on all detection metrics with the liquid storage data set. And with Recall of 1 and F1-score of 0.9857, it also outperforms those solutions on the SWAT data set. FedeX is also proven to be fast in terms of training time of about 7.5 minutes and lightweight in terms of hardware requirement with memory consumption of 14%, allowing us to deploy anomaly detection tasks on top of edge computing infrastructure and in real-time. Besides, FedeX is considered as one of the frameworks at the forefront of interpreting the predicted anomalies by using XAI, which enables experts to make quick decisions and trust the model more.
引用
收藏
页码:53854 / 53872
页数:19
相关论文
共 30 条
  • [1] A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond
    AbdulRahman, Sawsan
    Tout, Hanine
    Ould-Slimane, Hakima
    Mourad, Azzam
    Talhi, Chamseddine
    Guizani, Mohsen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07): : 5476 - 5497
  • [2] An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System
    Al-Abassi, Abdulrahman
    Karimipour, Hadis
    Dehghantanha, Ali
    Parizi, Reza M.
    [J]. IEEE ACCESS, 2020, 8 : 83965 - 83973
  • [3] Amarasinghe K, 2018, C HUM SYST INTERACT, P311, DOI 10.1109/HSI.2018.8430788
  • [4] Anomaly Detection for Industrial Control Systems Using K-Means and Convolutional Autoencoder
    Chang, Chun-Pi
    Hsu, Wen-Chiao
    Liao, I-En
    [J]. 2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2019, : 136 - 141
  • [5] Anomaly detection in Industrial Control Systems using Logical Analysis of Data
    Das, Tanmoy Kanti
    Adepu, Sridhar
    Zhou, Jianying
    [J]. COMPUTERS & SECURITY, 2020, 96
  • [6] State-Aware Anomaly Detection for Industrial Control Systems
    Ghaeini, Hamid Reza
    Antonioli, Daniele
    Brasser, Ferdinand
    Sadeghi, Ahmad-Reza
    Tippenhauer, Nils Ole
    [J]. 33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1620 - 1628
  • [7] A Dataset to Support Research in the Design of Secure Water Treatment Systems
    Goh, Jonathan
    Adepu, Sridhar
    Junejo, Khurum Nazir
    Mathur, Aditya
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2016), 2018, 10242 : 88 - 99
  • [8] A survey on internet of things security: Requirements, challenges, and solutions
    HaddadPajouh, Hamed
    Dehghantanha, Ali
    Parizi, Reza M.
    Aledhari, Mohammed
    Karimipour, Hadis
    [J]. INTERNET OF THINGS, 2021, 14
  • [9] Hindy Hanan, 2019, Computer Security. ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018. Revised Selected Papers: Lecture Notes in Computer Science (LNCS 11387), P3, DOI 10.1007/978-3-030-12786-2_1
  • [10] Detecting cyberattacks using anomaly detection in industrial control systems: A Federated Learning approach
    Huong, Truong Thu
    Bac, Ta Phuong
    Long, Dao Minh
    Luong, Tran Duc
    Dan, Nguyen Minh
    Quang, Le Anh
    Cong, Le Thanh
    Thang, Bui Doan
    Tran, Kim Phuc
    [J]. COMPUTERS IN INDUSTRY, 2021, 132 (132)