scispace - formally typeset
Open AccessJournal ArticleDOI

Anomaly Detection for Industrial Control System Based on Autoencoder Neural Network

Reads0
Chats0
TLDR
An anomaly detection method with a composite autoencoder model learning the normal pattern is proposed, which makes prediction and reconstruction on input data at the same time, which overcomes the shortcoming of using each one alone.
Abstract
As the Industrial Internet of Things (IIoT) develops rapidly, cloud computing and fog computing become effective measures to solve some problems, e.g., limited computing resources and increased network latency. The Industrial Control Systems (ICS) play a key factor within the development of IIoT, whose security affects the whole IIoT. ICS involves many aspects, like water supply systems and electric utilities, which are closely related to people’s lives. ICS is connected to the Internet and exposed in the cyberspace instead of isolating with the outside recent years. The risk of being attacked increases as a result. In order to protect these assets, intrusion detection systems (IDS) have drawn much attention. As one kind of intrusion detection, anomaly detection provides the ability to detect unknown attacks compared with signature-based techniques, which are another kind of IDS. In this paper, an anomaly detection method with a composite autoencoder model learning the normal pattern is proposed. Unlike the common autoencoder neural network that predicts or reconstructs data separately, our model makes prediction and reconstruction on input data at the same time, which overcomes the shortcoming of using each one alone. With the error obtained by the model, a change ratio is put forward to locate the most suspicious devices that may be under attack. In the last part, we verify the performance of our method by conducting experiments on the SWaT dataset. The results show that the proposed method exhibits improved performance with 88.5% recall and 87.0% F1-score.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Deep Learning in the Industrial Internet of Things: Potentials, Challenges, and Emerging Applications

TL;DR: This article outlines a variety of DL use cases for IIoT systems, including smart manufacturing, smart metering, and smart agriculture, and delineates several research challenges with the effective design and appropriate implementation of DL-IIoT.
Journal ArticleDOI

6G Enabled Industrial Internet of Everything: Towards a Theoretical Framework

TL;DR: This study embodies a synthesis of 6G, IoT, IoE, IIoE exhaustive literature review advancing knowledge to facilitate theory development and creates significant new knowledge in the literature contributing eternal insights to expound valuable contexts to ruminate significant findings.
Journal ArticleDOI

Toward Accurate Anomaly Detection in Industrial Internet of Things Using Hierarchical Federated Learning

TL;DR: Li et al. as discussed by the authors proposed a reliable anomaly detection strategy for Industrial Internet of Things using federated learning, which can promote the development of industrial intelligence, improve production efficiency, and reduce manufacturing costs.
Journal ArticleDOI

Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods

TL;DR: A hybrid anomaly detection method that combines statistical filtering and a composite autoencoder to effectively detect anomalous behaviors possibly caused by malicious activity in order to mitigate the risk of cyberattacks is proposed.
References
More filters
Proceedings Article

Adam: A Method for Stochastic Optimization

TL;DR: This work introduces Adam, an algorithm for first-order gradient-based optimization of stochastic objective functions, based on adaptive estimates of lower-order moments, and provides a regret bound on the convergence rate that is comparable to the best known results under the online convex optimization framework.
Proceedings Article

Unsupervised Learning of Video Representations using LSTMs

TL;DR: In this paper, an encoder LSTM is used to map an input video sequence into a fixed length representation, which is then decoded using single or multiple decoder Long Short Term Memory (LSTM) networks to perform different tasks.
Proceedings Article

Long Short Term Memory Networks for Anomaly Detection in Time Series.

TL;DR: The efficacy of stacked LSTM networks for anomaly/fault detection in time series on ECG, space shuttle, power demand, and multi-sensor engine dataset is demonstrated.
Posted Content

LSTM-based Encoder-Decoder for Multi-sensor Anomaly Detection

TL;DR: This work proposes a Long Short Term Memory Networks based Encoder-Decoder scheme for Anomaly Detection (EncDec-AD) that learns to reconstruct 'normal' time-series behavior, and thereafter uses reconstruction error to detect anomalies.
Book ChapterDOI

A Dataset to Support Research in the Design of Secure Water Treatment Systems

TL;DR: A dataset to support research in the design of secure Cyber Physical Systems (CPS), implemented on a six-stage Secure Water Treatment (SWaT) testbed that contains attacks that were created and generated by the research team.
Related Papers (5)