A Self-Tuning Cyber-Attacks' Location Identification Approach for Critical Infrastructures

被引:12
作者
Alabassi, Abdul [1 ]
Jahromi, Amir Namavar [1 ]
Karimipour, Hadis [2 ]
Dehghantanha, Ali [3 ]
Siano, Pierluigi [4 ]
Leung, Henry [2 ]
机构
[1] Univ Guelph, Sch Engn, Guelph, ON N1G 2W1, Canada
[2] Univ Calgary, Schulich Sch Engn, Calgary, AB T2N 1N4, Canada
[3] Univ Guelph, Sch Comp Sci, Guelph, ON N1G 2W1, Canada
[4] Univ Salerno, Dept Sci, I-84084 Fisciano, Italy
关键词
SCADA systems; Mathematical models; Smart grids; Critical infrastructure; Location awareness; Data models; Deep learning; cyber-attacks; principal component analysis (PCA); recurrent deep neural networks; supervisory control and data acquisition (SCADA); DATA INJECTION ATTACKS; INTRUSION DETECTION; SYSTEM; DEEP; SELECTION;
D O I
10.1109/TII.2021.3133361
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of the communications network and the Internet of Things in today's critical infrastructures facilitates intelligent and online monitoring of these systems. However, although critical infrastructure's digitalization brings tremendous advantages and opportunities for remote access and control, it significantly increases cyber-attack's vulnerability. Therefore, efficient and proper detection and localization of cyber-attack are paramount for the critical infrastructure's reliable and secure operation. This article proposes a deep learning-based cyber-attack detection and location identification system for critical infrastructures by constructing new representations and model the system behavior using multilayer autoencoders. The results show that the new representations capture the physical relationships among the measurements and have more discriminant power in distinguishing the location of the attack. Furthermore, the proposed method has outperformed conventional machine learning models under various cyber-attack scenarios using real-world data from the gas pipeline and water distribution supervisory control and data acquisition systems.
引用
收藏
页码:5018 / 5027
页数:10
相关论文
共 47 条
[21]   Relaxation-based anomaly detection in cyber-physical systems using ensemble kalman filter [J].
Karimipour, Hadis ;
Leung, Henry .
IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2020, 5 (01) :49-59
[22]   A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids [J].
Karimipour, Hadis ;
Dehghantanha, Ali ;
Parizi, Reza M. ;
Choo, Kim-Kwang Raymond ;
Leung, Henry .
IEEE ACCESS, 2019, 7 :80778-80788
[23]   Extended Kalman Filter-Based Parallel Dynamic State Estimation [J].
Karimipour, Hadis ;
Dinavahi, Venkata .
IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (03) :1539-1549
[24]   HML-DS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems [J].
Khan, Izhar Ahmed ;
Pi, Dechang ;
Khan, Zaheer Ullah ;
Hussain, Yasir ;
Nawaz, Asif .
IEEE ACCESS, 2019, 7 :89507-89521
[25]   Distributed Sensor Fusion in Water Quality Event Detection [J].
Koch, Mark W. ;
McKenna, Sean A. .
JOURNAL OF WATER RESOURCES PLANNING AND MANAGEMENT, 2011, 137 (01) :10-19
[26]   Characterization and Detection of Location Spoofing Attacks [J].
Lee, Jeong Heon ;
Buehrer, R. Michael .
JOURNAL OF COMMUNICATIONS AND NETWORKS, 2012, 14 (04) :396-409
[27]   Contamination event detection using multiple types of conventional water quality sensors in source water [J].
Liu, Shuming ;
Che, Han ;
Smith, Kate ;
Chen, Lei .
ENVIRONMENTAL SCIENCE-PROCESSES & IMPACTS, 2014, 16 (08) :2028-2038
[28]  
Maglaras LA, 2014, 2014 SCIENCE AND INFORMATION CONFERENCE (SAI), P626, DOI 10.1109/SAI.2014.6918252
[29]   GARS: Real-time system for identification, assessment and control of cyber grooming attacks [J].
Michalopoulos, Dimitrios ;
Mavridis, Ioannis ;
Jankovic, Marija .
COMPUTERS & SECURITY, 2014, 42 :177-190
[30]   Cyber intrusion detection by combined feature selection algorithm [J].
Mohammadi, Sara ;
Mirvaziri, Hamid ;
Ghazizadeh-Ahsaee, Mostafa ;
Karimipour, Hadis .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 44 :80-88