Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation

Author:

Tushkanova Olga1ORCID,Levshun Diana1ORCID,Branitskiy Alexander1ORCID,Fedorchenko Elena12ORCID,Novikova Evgenia1ORCID,Kotenko Igor12ORCID

Affiliation:

1. Computer Security Problems Laboratory, St. Petersburg Federal Research Center of the Russian Academy of Sciences, 199178 Saint-Petersburg, Russia

2. Department of computer science and engineering, Saint-Petersburg Electrotechnical University ETU “LETI”, 197022 Saint-Petersburg, Russia

Abstract

Cyberattacks on cyber-physical systems (CPS) can lead to severe consequences, and therefore it is extremely important to detect them at early stages. However, there are several challenges to be solved in this area; they include an ability of the security system to detect previously unknown attacks. This problem could be solved with the system behaviour analysis methods and unsupervised or semi-supervised machine learning techniques. The efficiency of the attack detection system strongly depends on the datasets used to train the machine learning models. As real-world data from CPS systems are mostly not available due to the security requirements of cyber-physical objects, there are several attempts to create such datasets; however, their completeness and validity are questionable. This paper reviews existing approaches to attack and anomaly detection in CPS, with a particular focus on datasets and evaluation metrics used to assess the efficiency of the proposed solutions. The analysis revealed that only two of the three selected datasets are suitable for solving intrusion detection tasks as soon as they are generated using real test beds; in addition, only one of the selected datasets contains both network and sensor data, making it preferable for intrusion detection. Moreover, there are different approaches to evaluate the efficiency of the machine learning techniques, that require more analysis and research. Thus, in future research, the authors aim to develop an approach to anomaly detection for CPS using the selected datasets and to conduct experiments to select the performance metrics.

Funder

RSF

Publisher

MDPI AG

Subject

Computational Mathematics,Computational Theory and Mathematics,Numerical Analysis,Theoretical Computer Science

Reference50 articles.

1. Levshun, D., Chechulin, A., and Kotenko, I. (2021). Design of Secure Microcontroller-Based Systems: Application to Mobile Robots for Perimeter Monitoring. Sensors, 21.

2. Turton, W., and Mehrotra, K. (2022, December 20). Hackers Breached Colonial Pipeline Using Compromised Password. 4 June 2021. Available online: https://www.bloomberg.com/news/articles/2021-06-04/hackers-breached-colonial-pipeline-using-compromised-password.

3. Jones, S. (2022, December 20). Venezuela Blackout: What Caused It and What Happens Next. The Guardian 13 March 2019. Available online: https://www.theguardian.com/world/2019/mar/13/venezuela-blackout-what-caused-it-and-what-happens-next.

4. Graham, R. (2022, December 20). Cyberattack Hits Germany’s Domestic Fuel Distribution System. 1 February, 2022. Available online: https://www.bloomberg.com/news/articles/2022-02-01/mabanaft-hit-by-cyberattack-that-disrupts-german-fuel-deliveries.

5. APAD: Autoencoder-based payload anomaly detection for industrial IoE;Kim;Appl. Soft Comput.,2020

Cited by 14 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Enhancing anomaly detection: A comprehensive approach with MTBO feature selection and TVETBO Optimized Quad-LSTM classification;Computers and Electrical Engineering;2024-10

2. Dataset Generation Methodology: Towards Application of Machine Learning in Industrial Water Treatment Security;SN Computer Science;2024-03-29

3. Selection of Machine Learning Methods for Keylogger Detection Based on Network Activity;2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS);2024-01-03

4. Anomaly Detection in IoT Networks Based on Intelligent Security Event Correlation;2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS);2024-01-03

5. Anomaly Behavior Analysis of Smart Water Treatment Facility Service: Design, Analysis, and Evaluation;2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA);2023-12-04

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3