2017 IEEE International Conference on Data Mining Workshops (ICDMW) 2017
DOI: 10.1109/icdmw.2017.149
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning

Abstract: In this paper, we propose and evaluate the application of unsupervised machine learning to anomaly detection for a Cyber-Physical System (CPS). We compare two methods: Deep Neural Networks (DNN) adapted to time series data generated by a CPS, and one-class Support Vector Machines (SVM). These methods are evaluated against data from the Secure Water Treatment (SWaT) testbed, a scaled-down but fully operational raw water purification plant. For both methods, we first train detectors using a log generated by SWaT… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
161
0
2

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 241 publications
(164 citation statements)
references
References 20 publications
1
161
0
2
Order By: Relevance
“…Precision Recall F1 DNN [11] 0.983 0.678 0.803 SVM [11] 0.925 0.699 0.796 TABOR [12] 0.862 0.788 0.823 1D CNN [13] 0 features are linear, and PCA can capture them. As PCA has an analytic solution that does not require iterative optimization, its training is much faster then the discussed neural networks (see Table V).…”
Section: Methodsmentioning
confidence: 99%
“…Precision Recall F1 DNN [11] 0.983 0.678 0.803 SVM [11] 0.925 0.699 0.796 TABOR [12] 0.862 0.788 0.823 1D CNN [13] 0 features are linear, and PCA can capture them. As PCA has an analytic solution that does not require iterative optimization, its training is much faster then the discussed neural networks (see Table V).…”
Section: Methodsmentioning
confidence: 99%
“…Other approaches learn models from physical data logs, and use them to evaluate whether or not the current state represents normal behaviour or not: most (e.g. [7], [12], [39]) use unsupervised learning to construct these models, although Chen et al [23], [25] use supervised learning by automatically seeding faults in the control programs (of a high-fidelity simulator). Adepu and Mathur [21], [22], [24] systematically and manually derive a comprehensive set of physics-based invariants and other conditions that relate the states of actuators and sensors, with any violations of them during operation reported.…”
Section: Background and Motivational Examplementioning
confidence: 99%
“…Let v s denote the current value of sensor s, L s denote its lower safety threshold, H s denote its upper safety threshold, and r s = H s − L s denote its range of safe values. Let Select k parents from P using Roulette Wheel Selection; 5 Generate new candidates from parents using crossover; 6 Generate new candidates from parents using bit flip mutation with probability pm; 7 Compute fitness of new candidates c with f (M (S, c)); 8 Replace P with the n fittest of the new and old candidates; 9 until timeout; 10 return candidate c ∈ P that maximises f (M (S, c));…”
Section: B Step Two: Fuzzing To Find Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Apart from monitoring physical invariants, the SWaT testbed has also been used to evaluate other attack detection mechanisms, such as a hierarchical intrusion detection system for monitoring network traffic [38], and anomaly detection approaches based on unsupervised machine learning [5,6]. The latter approaches were trained and evaluated using an attack log [12] from the testbed itself.…”
Section: Related Workmentioning
confidence: 99%