2022
DOI: 10.1016/j.ifacol.2022.09.550
|View full text |Cite
|
Sign up to set email alerts
|

Explainable Anomaly Detection for Industrial Control System Cybersecurity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…In this section, we summarize prior work that evaluates attributions of ICS anomaly detection. Although prior works have qualitatively evaluated explanations of ICS anomaly detection models with visualizations [18], [30], [37], [62], few prior works have quantitatively evaluated attributions by directly mapping anomaly scores produced from anomalydetection models to the features manipulated in the attack.…”
Section: Prior Work In Attributing Attacks On Icsmentioning
confidence: 99%
“…In this section, we summarize prior work that evaluates attributions of ICS anomaly detection. Although prior works have qualitatively evaluated explanations of ICS anomaly detection models with visualizations [18], [30], [37], [62], few prior works have quantitatively evaluated attributions by directly mapping anomaly scores produced from anomalydetection models to the features manipulated in the attack.…”
Section: Prior Work In Attributing Attacks On Icsmentioning
confidence: 99%
“…Ha et al [147] further develop strategies for leveraging XAI in IIoT environments by proposing an extension to existing One-Class Support Vector Machine (OCSVM) and LSTM algorithms that solve the human comprehension issue by integrating XAI into the model and generating human-readable explanations of predictive decisions reached by anomaly detection methods using OCSVM and LSTM. The integrated XAI modules interpret the ML predictions for the human operator of the CPS, reducing maintenance costs and accelerating decisions that require human intervention.…”
Section: Using Ai/ml For Anomaly Detectionmentioning
confidence: 99%
“…This approach entails training a machine learning model on a dataset that represents normal behavior, enabling it to identify deviations or anomalies effectively [119]. It can help detect abnormal activities, such as network intrusions, system misuse, or suspicious user behavior [120]. The correct detection of unusual events empowers the decision maker to act on the system to correctly avoid, correct, or react to the associated situations [121].…”
Section: Anomaly Detectionmentioning
confidence: 99%