2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) 2017
DOI: 10.1109/etfa.2017.8247663
|View full text |Cite
|
Sign up to set email alerts
|

Identifying false data injection attacks in industrial control systems using artificial neural networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(16 citation statements)
references
References 5 publications
0
16
0
Order By: Relevance
“…In order to select this threshold τ for Mahalanobis distance, we conduct an experiment to vary τ as a function of standard deviation (σ thr ) and mean (μ thr ) of Mahalanobis distance values of all the normal samples in training dataset as shown in (14). We use F1score as the performance metric to choose the value of η of (14) that results in the highest F1-score for training data to decide the optimal value of τ. τ = μ thr + η * σ thr .…”
Section: Corrdet Anomaly Detectionmentioning
confidence: 99%
“…In order to select this threshold τ for Mahalanobis distance, we conduct an experiment to vary τ as a function of standard deviation (σ thr ) and mean (μ thr ) of Mahalanobis distance values of all the normal samples in training dataset as shown in (14). We use F1score as the performance metric to choose the value of η of (14) that results in the highest F1-score for training data to decide the optimal value of τ. τ = μ thr + η * σ thr .…”
Section: Corrdet Anomaly Detectionmentioning
confidence: 99%
“…A straightforward approach is to create a separate level 0 monitoring network and compare the sensor data sent to Level 2 with the data received on the original level 0 monitoring network. Other more sophisticated mitigations include the use of autonomous and/or external defenses that can estimate the state of sensors/actuators based on physicsbased models [113], [114]. For the actuation decisions, all the commands should be authenticated using mechanisms of the industrial protocols [115] (see Section VI).…”
Section: ) Mitigationmentioning
confidence: 99%
“…A variety of machine learning methods have been developed to detect FDI attacks in the literature. Some methods rely on neural network‐based approaches to identify FDI samples, such as using a simple neural network architecture [24] or deep belief networks [21, 23]. Neural network‐based methods are capable of learning a non‐linear classifier to detect abnormal samples but with the high cost of computation complexity especially when the network is deep.…”
Section: Background Informationmentioning
confidence: 99%
“…Another advancement in bad data analysis in power systems is the surge in machine learning and artificial intelligence research. These studies are mainly based on neural network, deep learning and fuzzy clustering approaches [21–24]. More recently, physics‐model based solutions have been integrated with data‐driven solutions [25, 26] to take advantage of the temporal characteristics of real‐time data.…”
Section: Introductionmentioning
confidence: 99%