2019
DOI: 10.1061/(asce)wr.1943-5452.0001007
|View full text |Cite
|
Sign up to set email alerts
|

Cyberattack Detection Using Deep Generative Models with Variational Inference

Abstract: Recent years have witnessed a rise in the frequency and intensity of cyberattacks targeted at critical infrastructure systems. This study designs a versatile, data-driven cyberattack detection platform for infrastructure systems cybersecurity, with a special demonstration in water sector. A deep generative model with variational inference autonomously learns normal system behavior and detects attacks as they occur. The model can process the natural data in its raw form and automatically discover and learn its … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
13
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(14 citation statements)
references
References 24 publications
1
13
0
Order By: Relevance
“…Chandy et al. [41] used VAE as a deep generation model to simulate network attack detection problems. Osada et al [42] employed VAE as a semi-supervised learning for intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
“…Chandy et al. [41] used VAE as a deep generation model to simulate network attack detection problems. Osada et al [42] employed VAE as a semi-supervised learning for intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
“…and applying the triangle inequality and subsequently using Equations (2a), (4b), and (5). If Equation (16) holds,…”
Section: Randomized Lempc Changes To Probe For Cyberattacks: Stabilmentioning
confidence: 99%
“…In light of this, attack detection has received focus in the literature (e.g., References 3,4). Attack detection methods for cyber‐physical systems have included those which are data based for applications such as water systems 5 and smart grids 6 . In addition, resilient control designs based on state estimation have been developed for handling and detecting attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The authors in [15] use first operational variables to check whether physical and/or operating rules have been violated, and the generated set of flagged events feeds a deep learning method based on a convolutional variational auto-encoder to calculate the probability for measured data being anomalous.…”
Section: Related Workmentioning
confidence: 99%