Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
143 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

A Variational Autoencoder Framework for Robust, Physics-Informed Cyberattack Recognition in Industrial Cyber-Physical Systems (2310.06948v1)

Published 10 Oct 2023 in cs.LG, cs.SY, and eess.SY

Abstract: Cybersecurity of Industrial Cyber-Physical Systems is drawing significant concerns as data communication increasingly leverages wireless networks. A lot of data-driven methods were develope for detecting cyberattacks, but few are focused on distinguishing them from equipment faults. In this paper, we develop a data-driven framework that can be used to detect, diagnose, and localize a type of cyberattack called covert attacks on networked industrial control systems. The framework has a hybrid design that combines a variational autoencoder (VAE), a recurrent neural network (RNN), and a Deep Neural Network (DNN). This data-driven framework considers the temporal behavior of a generic physical system that extracts features from the time series of the sensor measurements that can be used for detecting covert attacks, distinguishing them from equipment faults, as well as localize the attack/fault. We evaluate the performance of the proposed method through a realistic simulation study on a networked power transmission system as a typical example of ICS. We compare the performance of the proposed method with the traditional model-based method to show its applicability and efficacy.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (36)
  1. Guide to industrial control systems (ics) security. NIST special publication, 800(82):16–16, 2011.
  2. An approach to cyber-physical vulnerability assessment for intelligent manufacturing systems. Journal of Manufacturing Systems, 43:339–351, 2017.
  3. Cyber–physical system security for the electric power grid. Proceedings of the IEEE, 100(1):210–224, 2011.
  4. David Kushner. The real story of stuxnet. ieee Spectrum, 3(50):48–53, 2013.
  5. Siddharth Sridhar and G Manimaran. Data integrity attacks and their impacts on scada control system. In IEEE PES general meeting, pages 1–6. IEEE, 2010.
  6. Secure state estimation and control of cyber-physical systems: A survey. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51(1):176–190, 2020.
  7. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC), 14(1):13, 2011.
  8. Sequential monitoring of scada systems against cyber/physical attacks. IFAC-PapersOnLine, 48(21):746–753, 2015.
  9. Attacks against process control systems: risk assessment, detection, and response. In Proceedings of the 6th ACM symposium on information, computer and communications security, pages 355–366. ACM, 2011.
  10. An online detection framework for cyber attacks on automatic generation control. IEEE Transactions on Power Systems, 33(6):6816–6827, 2018.
  11. Quickest detection of false data injection attack in wide-area smart grids. IEEE Transactions on Smart Grid, 6(6):2725–2735, 2014.
  12. Mitigating iot-based cyberattacks on the smart grid. In 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), pages 517–522. IEEE, 2017.
  13. Cyber-attack detection for industrial control system monitoring with support vector machine based on communication profile. In 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pages 132–138. IEEE, 2017.
  14. Specification mining for intrusion detection in networked control systems. In USENIX Security Symposium, pages 791–806, 2016.
  15. Deep learning based covert attack identification for industrial control systems. In 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA), pages 438–445. IEEE, 2020.
  16. Protecting water infrastructure from cyber and physical threats: Using multimodal data fusion and adaptive deep learning to monitor critical systems. IEEE Signal Processing Magazine, 36(2):36–48, 2019.
  17. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials, 18(2):1153–1176, 2015.
  18. Digital twin-based cyber-attack detection framework for cyber-physical manufacturing systems. IEEE Transactions on Automation Science and Engineering, 2023.
  19. Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data. IEEE Transactions on Industrial Informatics, 15(7):4362–4369, 2019.
  20. An ensemble deep learning-based cyber-attack detection in industrial control system. IEEE Access, 8:83965–83973, 2020.
  21. An online approach to covert attack detection and identification in power systems. IEEE Transactions on Power Systems, 38(1):267–277, 2022.
  22. A secure hybrid dynamic-state estimation approach for power systems under false data injection attacks. IEEE Transactions on Industrial Informatics, 16(12):7275–7286, 2020.
  23. Diagnosis of outliers and cyber attacks in dynamic pmu-based power state estimation. IEEE transactions on power systems, 35(2):1188–1197, 2019.
  24. Covert attacks in cyber-physical control systems. IEEE Transactions on Industrial Informatics, 13(4):1641–1651, 2017.
  25. A model inversion based watermark for replay attack detection with output tracking. In 2019 American Control Conference (ACC), pages 384–390. IEEE, 2019.
  26. Lightweight long short-term memory variational auto-encoder for multivariate time series anomaly detection in industrial control systems. Sensors, 22(8):2886, 2022.
  27. Variational auto-encoder-based detection of electricity stealth cyber-attacks in ami networks. In 2020 28th European Signal Processing Conference (EUSIPCO), pages 1590–1594. IEEE, 2021.
  28. The multiclass fault diagnosis of wind turbine bearing based on multisource signal fusion and deep learning generative model. IEEE Transactions on Instrumentation and Measurement, 71:1–12, 2022.
  29. A computationally efficient mixed-integer linear formulation for the thermal unit commitment problem. IEEE Transactions on power systems, 21(3):1371–1378, 2006.
  30. Roy S Smith. A decoupled feedback structure for covertly appropriating networked control systems. IFAC Proceedings Volumes, 44(1):90–95, 2011.
  31. Early detection and diagnosis of wind turbine abnormal conditions using an interpretable supervised variational autoencoder model. Energies, 16(12):4544, 2023.
  32. Non-invasive detection of rotor inter-turn short circuit of a hydrogenerator using ai-based variational autoencoder. IEEE Transactions on Industry Applications, 2023.
  33. Deep state space models for time series forecasting. Advances in neural information processing systems, 31, 2018.
  34. Deep state space models for nonlinear system identification. IFAC-PapersOnLine, 54(7):481–486, 2021.
  35. Pecan Street. Dataport: the world’s largest energy data resource. Pecan Street Inc, 2015.
  36. Matpower: Steady-state operations, planning, and analysis tools for power systems research and education. IEEE Transactions on power systems, 26(1):12–19, 2010.
Citations (4)

Summary

We haven't generated a summary for this paper yet.