2018
DOI: 10.1061/(asce)wr.1943-5452.0000969
|View full text |Cite
|
Sign up to set email alerts
|

Battle of the Attack Detection Algorithms: Disclosing Cyber Attacks on Water Distribution Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
131
0
1

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 175 publications
(133 citation statements)
references
References 31 publications
1
131
0
1
Order By: Relevance
“…where S T DD is the time-to-detection score, S CLF is the classification score, and γ determines the relative importance of the two scores and is set to 0.5. The details of the calculation of both scores are based on the log record labels and are described in [37]. To summarize, our extensions to the anomaly detection method used in [13] are: • generalization of the prediction, allowing arbitrary length sequence prediction and arbitrary prediction horizon,…”
Section: F Anomaly Detection and Scoring Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…where S T DD is the time-to-detection score, S CLF is the classification score, and γ determines the relative importance of the two scores and is set to 0.5. The details of the calculation of both scores are based on the log record labels and are described in [37]. To summarize, our extensions to the anomaly detection method used in [13] are: • generalization of the prediction, allowing arbitrary length sequence prediction and arbitrary prediction horizon,…”
Section: F Anomaly Detection and Scoring Methodsmentioning
confidence: 99%
“…At the same time, the traffic from PLC3 to SCADA is modified to replay previously recorded values of L T2, as well as V2 flow and pressures. Figure 7 shows that the status of the valve was not replayed, although the authors of [37] reported that it was. Also, one can see that immediately after the attack the system returns to its regular cycle.…”
Section: B Batadalmentioning
confidence: 99%
“…Second case is taken from the literature and contains a more diverse set of attacks. This dataset used for evaluating the algorithm is from BATADAL (Taormina et al 2018). Training dataset 1 (Taormina et al 2018), which contains no attacks and represents normal operating conditions, is used for training the model.…”
Section: Casementioning
confidence: 99%
“…This dataset used for evaluating the algorithm is from BATADAL (Taormina et al 2018). Training dataset 1 (Taormina et al 2018), which contains no attacks and represents normal operating conditions, is used for training the model. Test dataset (Taormina et al 2018), which contains seven attacks, is used to test and evaluate the trained model.…”
Section: Casementioning
confidence: 99%
“…Beyond keeping software updated, this also means making use of state-of-the-art quality assurance methods for penetration testing and fault detection algorithms. As illustrated by Taormina et al [17] for water distribution networks, the analysis of network monitoring data alone could allow cyberattacks to be detected. Since cyberattacks could then be concealed or simulated simply by compromising the monitoring data, technology such as blockchain might be a solution to secure such data.…”
Section: Responding To Smart Water Challengesmentioning
confidence: 99%