A Self-Tuning Cyber-Attacks' Location Identification Approach for Critical Infrastructures

被引:12
作者
Alabassi, Abdul [1 ]
Jahromi, Amir Namavar [1 ]
Karimipour, Hadis [2 ]
Dehghantanha, Ali [3 ]
Siano, Pierluigi [4 ]
Leung, Henry [2 ]
机构
[1] Univ Guelph, Sch Engn, Guelph, ON N1G 2W1, Canada
[2] Univ Calgary, Schulich Sch Engn, Calgary, AB T2N 1N4, Canada
[3] Univ Guelph, Sch Comp Sci, Guelph, ON N1G 2W1, Canada
[4] Univ Salerno, Dept Sci, I-84084 Fisciano, Italy
关键词
SCADA systems; Mathematical models; Smart grids; Critical infrastructure; Location awareness; Data models; Deep learning; cyber-attacks; principal component analysis (PCA); recurrent deep neural networks; supervisory control and data acquisition (SCADA); DATA INJECTION ATTACKS; INTRUSION DETECTION; SYSTEM; DEEP; SELECTION;
D O I
10.1109/TII.2021.3133361
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of the communications network and the Internet of Things in today's critical infrastructures facilitates intelligent and online monitoring of these systems. However, although critical infrastructure's digitalization brings tremendous advantages and opportunities for remote access and control, it significantly increases cyber-attack's vulnerability. Therefore, efficient and proper detection and localization of cyber-attack are paramount for the critical infrastructure's reliable and secure operation. This article proposes a deep learning-based cyber-attack detection and location identification system for critical infrastructures by constructing new representations and model the system behavior using multilayer autoencoders. The results show that the new representations capture the physical relationships among the measurements and have more discriminant power in distinguishing the location of the attack. Furthermore, the proposed method has outperformed conventional machine learning models under various cyber-attack scenarios using real-world data from the gas pipeline and water distribution supervisory control and data acquisition systems.
引用
收藏
页码:5018 / 5027
页数:10
相关论文
共 47 条
[1]  
Al Ghazo AT, 2019, 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), P716, DOI [10.1109/UEMCON47517.2019.8993076, 10.1109/uemcon47517.2019.8993076]
[2]   An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System [J].
Al-Abassi, Abdulrahman ;
Karimipour, Hadis ;
Dehghantanha, Ali ;
Parizi, Reza M. .
IEEE ACCESS, 2020, 8 :83965-83973
[3]   Hierarchical Location Identification of Destabilizing Faults and Attacks in Power Systems: A Frequency-Domain Approach [J].
Amini, Sajjad ;
Pasqualetti, Fabio ;
Abbaszadeh, Masoud ;
Mohsenian-Rad, Hamed .
IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (02) :2036-2045
[4]  
Ayad A, 2018, INNOV SMART GRID TEC
[5]   Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation [J].
Bi, Suzhi ;
Zhang, Ying Jun .
IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (03) :1216-1227
[6]   Coordinated Cyber-Attacks on the Measurement Function in Hybrid State Estimation [J].
Chakhchoukh, Yacine ;
Ishii, Hideaki .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2015, 30 (05) :2487-2497
[7]   Risk evaluation for spoofing against a sensor supplied with liveness detection [J].
Espinoza, Marcela ;
Champod, Christophe .
FORENSIC SCIENCE INTERNATIONAL, 2011, 204 (1-3) :162-168
[8]   Combating advanced persistent threats: From network event correlation to incident detection [J].
Friedberg, Ivo ;
Skopik, Florian ;
Settanni, Giuseppe ;
Fiedler, Roman .
COMPUTERS & SECURITY, 2015, 48 :35-57
[9]   A Dataset to Support Research in the Design of Secure Water Treatment Systems [J].
Goh, Jonathan ;
Adepu, Sridhar ;
Junejo, Khurum Nazir ;
Mathur, Aditya .
CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2016), 2018, 10242 :88-99
[10]   A survey on internet of things security: Requirements, challenges, and solutions [J].
HaddadPajouh, Hamed ;
Dehghantanha, Ali ;
Parizi, Reza M. ;
Aledhari, Mohammed ;
Karimipour, Hadis .
INTERNET OF THINGS, 2021, 14