2019
DOI: 10.1109/access.2019.2958284
|View full text |Cite
|
Sign up to set email alerts
|

On the Generation of Anomaly Detection Datasets in Industrial Control Systems

Abstract: In recent decades, Industrial Control Systems (ICS) have been affected by heterogeneous cyberattacks that have a huge impact on the physical world and the people's safety. Nowadays, the techniques achieving the best performance in the detection of cyber anomalies are based on Machine Learning and, more recently, Deep Learning. Due to the incipient stage of cybersecurity research in ICS, the availability of datasets enabling the evaluation of anomaly detection techniques is insufficient. In this paper, we propo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
38
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 76 publications
(38 citation statements)
references
References 29 publications
0
38
0
Order By: Relevance
“…Our approach obtained the best recall for Cyber Attack 27; whereas, for Cyber Attacks 2, 10, 11, 22, 26, 30, and 40, it achieved state-of-the-art performance. Regarding Cyber Attacks 7,8,17,23,28,36,37,39, and 41, our performance was, at most, 10% lower than the performance of the rest of the works.…”
Section: Validationmentioning
confidence: 61%
See 1 more Smart Citation
“…Our approach obtained the best recall for Cyber Attack 27; whereas, for Cyber Attacks 2, 10, 11, 22, 26, 30, and 40, it achieved state-of-the-art performance. Regarding Cyber Attacks 7,8,17,23,28,36,37,39, and 41, our performance was, at most, 10% lower than the performance of the rest of the works.…”
Section: Validationmentioning
confidence: 61%
“…Similarly, the authors of [35] presented an IDS based on three models of machine learning (J48, naive Bayes, and RF) to detect Distributed Denials of Service (DDoS) in SCADA systems. In [36], the authors generated a new dataset collected from an electric traction sub-station and tried semi-supervised and supervised ML and DL models to detect anomalies. Among the models tested, we highlight RF, Support Vector Machine (SVM), One-Class Support Vector Machine (OCSVM), IF and DNN.…”
Section: Related Workmentioning
confidence: 99%
“…In this work, we used an open industrial dataset named Electra, 45,46 which contains protocols like the ones we found on our scenario. Specifically, Electra includes four S7Comm devices and three Modbus TCP devices.…”
Section: Deployment and Experimental Resultsmentioning
confidence: 99%
“…These elements are applied to a condition of the normal packet data and attack packet data on a testbed environment that represents the actual system. Ongoing Research on SCADA system is presented by Gómez et al [20] about the methodology to generate anomaly detection datasets, the methodology is composed of four steps: attack selection, attack deployment, traffic capture and feature selection. The first and second steps indicate which and how to launch the attacks in the testbed, whereas the third and fourth steps deal with the capture of network traffic from the testbed and the extraction of relevant features.…”
Section: Dataset Issuementioning
confidence: 99%