2022
DOI: 10.1007/978-3-031-17143-7_24
|View full text |Cite
|
Sign up to set email alerts
|

Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 30 publications
2
8
0
Order By: Relevance
“…In contrast, authors have to carefully examine their results on the SWaT dataset since, depending on the chosen metric, their IIDS may perform excellently or poorly. These results are in line with Fung et al [27], finding that timeseries metrics are preferable for reconstruction-based IIDSs and point-based scores may be misleading. For the affiliation metrics by Huet et al [36], our experiment challenges their results, especially for an IIDS that emits alerts randomly.…”
Section: Discussionsupporting
confidence: 91%
See 3 more Smart Citations
“…In contrast, authors have to carefully examine their results on the SWaT dataset since, depending on the chosen metric, their IIDS may perform excellently or poorly. These results are in line with Fung et al [27], finding that timeseries metrics are preferable for reconstruction-based IIDSs and point-based scores may be misleading. For the affiliation metrics by Huet et al [36], our experiment challenges their results, especially for an IIDS that emits alerts randomly.…”
Section: Discussionsupporting
confidence: 91%
“…Finally, various meta-surveys focus on machine learning pitfalls for industrial intrusion detection [8,23,27,49,56,69,79,80] or highlight challenges when transferring IIDSs from research to actual industrial deployments [3,56,74]. These problems include, e.g., inappropriate use of metrics [10], the dominance of lab-based datasets [10,69], analysis of dataset quality [49,79], or predominant focus on only a few of the wide range of industrial domains and protocols [69].…”
Section: Related Work On Evaluating Iidssmentioning
confidence: 99%
See 2 more Smart Citations
“…At test time, the predicted state is compared with the observed state; if the total difference between the prediction and observation (i.e., reconstruction error) exceeds a threshold, an anomaly is declared [39], [72]. This approach has been shown to effectively detect attacks across various types of ICS [7], [19], [27] and with various model architectures [18], [24], [39], [72].…”
Section: Introductionmentioning
confidence: 99%