Data Driven Physical Modelling For Intrusion Detection In Cyber Physical Systems

被引:12
|
作者
Junejo, Khurum Nazir [1 ,3 ]
Yau, David [1 ,2 ]
机构
[1] Singapore Univ Technol & Design, 8 Somapah Rd, Singapore 487372, Singapore
[2] Illinois Singapore, Adv Digital Sci Ctr, Singapore, Singapore
[3] Karachi Inst Econ & Technol, Karachi, Pakistan
来源
PROCEEDINGS OF THE SINGAPORE CYBER-SECURITY CONFERENCE (SG-CRC) 2016: CYBER-SECURITY BY DESIGN | 2016年 / 14卷
关键词
Cyber Physical Systems Security; Machine Learning; Intrusion Detection; Fault Detection;
D O I
10.3233/978-1-61499-617-0-43
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cyber physical systems are critical to the infrastructure of a country. They are becoming more vulnerable to cyber attacks due to their use of off the shelf servers and industrial network protocols. Availability on World Wide Web for monitoring and reporting, has further aggravated their risk of being attacked. Once an attacker breaches the network security, he can affect the operations of the system which may even lead to a catastrophe. Mathematical and formal models try to detect the departure of the system from its expected behaviour but are difficult to build, and are sensitive to noise. Furthermore they take a lot of time to detect the attack. We here propose a behaviour based machine learning intrusion detection approach that quickly detects attacks at the physical process layer. We validate our result on a complete replicate of the physical and control components of a real modern water treatment facility. Our approach is fast, scalable, robust to noise, and exhibits a low false positive (FP) rate with high precision and recall. The model can be easily updated to match the changing behaviour of the system and environment.
引用
收藏
页码:43 / 57
页数:15
相关论文
共 50 条
  • [41] Privacy and security of big data in cyber physical systems using Weibull distribution-based intrusion detection
    Gifty, R.
    Bharathi, R.
    Krishnakumar, P.
    NEURAL COMPUTING & APPLICATIONS, 2019, 31 (Suppl 1): : 23 - 34
  • [42] Data-Driven False Data-Injection Attack Design and Detection in Cyber-Physical Systems
    Zhao, Zhengen
    Huang, Yimin
    Zhen, Ziyang
    Li, Yuzhe
    IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (12) : 6179 - 6187
  • [43] Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems
    Mitchell, Robert
    Chen, Ing-Ray
    2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [44] Analytical Modelling of Cyber-physical Systems
    Tavolato, Paul
    Tavolato-Woetzl, Christina
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 685 - 689
  • [45] Hybrid intelligent technique for intrusion detection in cyber physical systems with improved feature set
    Sagar, Maloth
    Vanmathi, C.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2024, 46 (02) : 3411 - 3427
  • [46] Survivability Analysis of Mobile Cyber Physical Systems with Voting-Based Intrusion Detection
    Mitchell, Robert
    Chen, Ing-Ray
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 2256 - 2261
  • [47] TICPS: A trustworthy collaborative intrusion detection framework for industrial cyber-physical systems
    Zhu, Lingzi
    Zhao, Bo
    Li, Weidong
    Wang, Yixuan
    An, Yang
    AD HOC NETWORKS, 2024, 160
  • [48] Meta-Learning to Improve Unsupervised Intrusion Detection in Cyber-Physical Systems
    Zoppi, Tommaso
    Gharib, Mohamad
    Atif, Muhammad
    Bondavalli, Andrea
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2021, 5 (04)
  • [49] Multilayer Perceptron with Binary Weights and Activations for Intrusion Detection of Cyber-Physical Systems
    Alpano, Paul Vincent S.
    Pedrasa, Jhoanna Rhodette I.
    Atienza, Rowel
    TENCON 2017 - 2017 IEEE REGION 10 CONFERENCE, 2017, : 2825 - 2829
  • [50] Cascading Bagging and Boosting Ensemble Methods for Intrusion Detection in Cyber-Physical Systems
    Ji, Ram
    Selwal, Arvind
    Kumar, Neerendra
    Padha, Devanand
    SECURITY AND PRIVACY, 2025, 8 (01):