A Comparative Study of Time Series Anomaly Detection Models for Industrial Control Systems

Author:

Kim Bedeuro1ORCID,Alawami Mohsen Ali1ORCID,Kim Eunsoo1,Oh Sanghak1,Park Jeongyong2,Kim Hyoungshick1ORCID

Affiliation:

1. Department of Electrical and Computer Engineering, Sungkyunkwan University, 2066 Seobu-ro, Jangan-gu, Suwon-si 16419, Gyeonggi-do, Republic of Korea

2. Department of Computer Science and Engineering, Sungkyunkwan University, 2066 Seobu-ro, Jangan-gu, Suwon-si 16419, Gyeonggi-do, Republic of Korea

Abstract

Anomaly detection has been known as an effective technique to detect faults or cyber-attacks in industrial control systems (ICS). Therefore, many anomaly detection models have been proposed for ICS. However, most models have been implemented and evaluated under specific circumstances, which leads to confusion about choosing the best model in a real-world situation. In other words, there still needs to be a comprehensive comparison of state-of-the-art anomaly detection models with common experimental configurations. To address this problem, we conduct a comparative study of five representative time series anomaly detection models: InterFusion, RANSynCoder, GDN, LSTM-ED, and USAD. We specifically compare the performance analysis of the models in detection accuracy, training, and testing times with two publicly available datasets: SWaT and HAI. The experimental results show that the best model results are inconsistent with the datasets. For SWaT, InterFusion achieves the highest F1-score of 90.7% while RANSynCoder achieves the highest F1-score of 82.9% for HAI. We also investigate the effects of the training set size on the performance of anomaly detection models. We found that about 40% of the entire training set would be sufficient to build a model producing a similar performance compared to using the entire training set.

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry

Reference64 articles.

1. Nawrocki, M., Schmidt, T.C., and Wählisch, M. (2020, January 20–24). Uncovering Vulnerable Industrial Control Systems from the Internet Core. Proceedings of the IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary.

2. Barbieri, G., Conti, M., Tippenhauer, N.O., and Turrin, F. (2020). Sorry, Shodan is not Enough! Assessing ICS Security via IXP Network Traffic Analysis. arXiv.

3. Di Pinto, A., Dragoni, Y., and Carcano, A. (2018, January 4–9). TRITON: The First ICS Cyber Attack on Safety Instrument Systems. Proceedings of the Black Hat USA, Las Vegas, NV, USA.

4. On Security Challenges and Open Issues in Internet of Things;Sha;Future Gener. Comput. Syst.,2018

5. Lab, K. (1997). Threat Landscape for Industrial Automation Systems in the Second Half of 2016, AO Kaspersky Lab. Technical Report.

Cited by 35 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Abnormal behavior detection in industrial control systems based on CNN;Alexandria Engineering Journal;2024-11

2. Enhancing Critical Infrastructure Security: Unsupervised Learning Approaches for Anomaly Detection;International Journal of Computational Intelligence Systems;2024-09-10

3. ICS Anomaly Detection Based on Sensor Patterns and Actuator Rules in Spatiotemporal Dependency;IEEE Transactions on Industrial Informatics;2024-08

4. An anomaly detection model for multivariate time series with anomaly perception;PeerJ Computer Science;2024-07-31

5. Improving Air Quality Data Analysis by Injecting and Detecting Contextual Anomalies;IGARSS 2024 - 2024 IEEE International Geoscience and Remote Sensing Symposium;2024-07-07

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3