Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security 2016
DOI: 10.1145/2899015.2899016
|View full text |Cite
|
Sign up to set email alerts
|

Behaviour-Based Attack Detection and Classification in Cyber Physical Systems Using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
49
2
2

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 77 publications
(53 citation statements)
references
References 19 publications
0
49
2
2
Order By: Relevance
“…The PMU or synchro-phasor was built upon the cyber layer to serve real-time information [25] which can act as a bridge among physical and cyber amplitudes [26]. Besides, machine learning approaches have also been performed to intrusion detection related issues; following studies can be found in references [27][28][29][30]. Authors of the paper [27] presented a machine learning behavior-based method for the intrusion detection, and the data set that they utilized was Secure Water Treatment (SWaT)-generated information from eighteen attacks with ten type models.…”
Section: A Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…The PMU or synchro-phasor was built upon the cyber layer to serve real-time information [25] which can act as a bridge among physical and cyber amplitudes [26]. Besides, machine learning approaches have also been performed to intrusion detection related issues; following studies can be found in references [27][28][29][30]. Authors of the paper [27] presented a machine learning behavior-based method for the intrusion detection, and the data set that they utilized was Secure Water Treatment (SWaT)-generated information from eighteen attacks with ten type models.…”
Section: A Backgroundmentioning
confidence: 99%
“…Besides, machine learning approaches have also been performed to intrusion detection related issues; following studies can be found in references [27][28][29][30]. Authors of the paper [27] presented a machine learning behavior-based method for the intrusion detection, and the data set that they utilized was Secure Water Treatment (SWaT)-generated information from eighteen attacks with ten type models. In paper [28] authors utilized a rapid one-class category method that overcomes the disadvantages of high sensitivity to the outliers; also, the presented approach was examined on an actual data set from distribution systems of drink water in France.…”
Section: A Backgroundmentioning
confidence: 99%
“…Particularly, the anomaly detection algorithm outlined in Reference used a long short‐term memory (LSTM) neural network as a predictor to model normal behavior of a water treatment testbed, and used the Cumulative Sum (CUSUM) method to identify anomalies. Using various machine‐learning classification methods, cyber‐attacks on power systems were distinguished from process disturbances in Reference , and a behavior‐based intrusion detection algorithm was developed to identify the type of attack . Similarly, detection of cyber‐attacks in a chemical process was realized via development of feed‐forward artificial neural networks in Reference , where compromised signals were rerouted to a secure sensor upon detection.…”
Section: Introductionmentioning
confidence: 99%
“…Using various machine-learning classification methods, cyber-attacks on power systems were distinguished from process disturbances in Reference 17, and a behavior-based intrusion detection algorithm was developed to identify the type of attack. 18 Similarly, detection of cyber-attacks in a chemical process was realized via development of feed-forward artificial neural networks in Reference 19, where compromised signals were rerouted to a secure sensor upon detection. These recent literature contributions have demonstrated the feasibility of machine-learning algorithms in anomaly detection.…”
Section: Introductionmentioning
confidence: 99%
“…In the last decade, the use of machine learning has grown from the field of statistics to become a primary mechanism for prediction in diverse applications. In particular, machine learning methods have been widely used in sensors, such as addressing energy-aware communications [ 5 ], attack detection and classification [ 6 ], task scheduling in wireless sensor networks [ 7 ] and generating workloads for cloud computing [ 8 ]. Due to the energy and bandwidth constraints of sensors, it is not possible to transmit all the data back to the base station for processing and inference, therefore, it is necessary to apply distributed machine learning in sensors, which can greatly reduce the amount of data in the communication and truly utilize the distributed characteristics of sensors [ 9 ].…”
Section: Introductionmentioning
confidence: 99%