Unsupervised Ensemble Methods for Anomaly Detection in PLC-based Process
Control
- URL: http://arxiv.org/abs/2302.02097v1
- Date: Sat, 4 Feb 2023 05:28:34 GMT
- Title: Unsupervised Ensemble Methods for Anomaly Detection in PLC-based Process
Control
- Authors: Emmanuel Aboah Boateng, and Bruce J. W
- Abstract summary: Integration of communication networks and the Internet of Things has increased ICS vulnerability to cyber-attacks.
This work proposes novel unsupervised machine learning ensemble methods for anomaly detection in PLC-based ICS.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Programmable logic controller (PLC) based industrial control systems (ICS)
are used to monitor and control critical infrastructure. Integration of
communication networks and an Internet of Things approach in ICS has increased
ICS vulnerability to cyber-attacks. This work proposes novel unsupervised
machine learning ensemble methods for anomaly detection in PLC-based ICS. The
work presents two broad approaches to anomaly detection: a weighted voting
ensemble approach with a learning algorithm based on coefficient of
determination and a stacking-based ensemble approach using isolation forest
meta-detector. The two ensemble methods were analyzed via an open-source
PLC-based ICS subjected to multiple attack scenarios as a case study. The work
considers four different learning models for the weighted voting ensemble
method. Comparative performance analyses of five ensemble methods driven
diverse base detectors are presented. Results show that stacking-based ensemble
method using isolation forest meta-detector achieves superior performance to
previous work on all performance metrics. Results also suggest that effective
unsupervised ensemble methods, such as stacking-based ensemble having isolation
forest meta-detector, can robustly detect anomalies in arbitrary ICS datasets.
Finally, the presented results were validated by using statistical hypothesis
tests.
Related papers
- Machine Learning-Based Cyberattack Detection and Identification for Automatic Generation Control Systems Considering Nonlinearities [0.6144680854063939]
AGC systems' reliance on communicated measurements exposes them to false data injection attacks (FDIAs)
This paper proposes a machine learning (ML)-based detection framework that identifies FDIAs and determines the compromised measurements.
Our results demonstrate the efficacy of the proposed method in detecting FDIAs while maintaining a low false alarm rate, with an F1-score of up to 99.98%, outperforming existing approaches.
arXiv Detail & Related papers (2025-04-12T23:06:59Z) - Enhanced Anomaly Detection in Industrial Control Systems aided by Machine Learning [2.2457306746668766]
This study investigates whether combining both network and process data can improve attack detection in ICSs environments.
Our findings suggest that integrating network traffic with operational process data can enhance detection capabilities.
Although the results are promising, they are preliminary and highlight the need for further studies.
arXiv Detail & Related papers (2024-10-25T17:41:33Z) - Physics-informed and Unsupervised Riemannian Domain Adaptation for Machine Learning on Heterogeneous EEG Datasets [53.367212596352324]
We propose an unsupervised approach leveraging EEG signal physics.
We map EEG channels to fixed positions using field, source-free domain adaptation.
Our method demonstrates robust performance in brain-computer interface (BCI) tasks and potential biomarker applications.
arXiv Detail & Related papers (2024-03-07T16:17:33Z) - Semi-DETR: Semi-Supervised Object Detection with Detection Transformers [105.45018934087076]
We analyze the DETR-based framework on semi-supervised object detection (SSOD)
We present Semi-DETR, the first transformer-based end-to-end semi-supervised object detector.
Our method outperforms all state-of-the-art methods by clear margins.
arXiv Detail & Related papers (2023-07-16T16:32:14Z) - Two-phase Dual COPOD Method for Anomaly Detection in Industrial Control
System [0.0]
Traditional ICS anomaly detection methods lack transparency and interpretability.
This paper proposes a two-phase dual Copula-based Outlier Detection (COPOD) method that addresses these challenges.
The method is based on empirical distribution functions, parameter-free, and provides interpretability by quantifying each feature's contribution to an anomaly.
arXiv Detail & Related papers (2023-04-30T18:13:40Z) - Interactive System-wise Anomaly Detection [66.3766756452743]
Anomaly detection plays a fundamental role in various applications.
It is challenging for existing methods to handle the scenarios where the instances are systems whose characteristics are not readily observed as data.
We develop an end-to-end approach which includes an encoder-decoder module that learns system embeddings.
arXiv Detail & Related papers (2023-04-21T02:20:24Z) - A step towards the applicability of algorithms based on invariant causal
learning on observational data [0.0]
In this paper, we show how to apply Invariant Causal Prediction (ICP) efficiently integrated with causal discovery methods.
We also show how to apply ICP efficiently integrated with our method for causal discovery.
arXiv Detail & Related papers (2023-04-05T08:15:57Z) - Large-Scale Sequential Learning for Recommender and Engineering Systems [91.3755431537592]
In this thesis, we focus on the design of an automatic algorithms that provide personalized ranking by adapting to the current conditions.
For the former, we propose novel algorithm called SAROS that take into account both kinds of feedback for learning over the sequence of interactions.
The proposed idea of taking into account the neighbour lines shows statistically significant results in comparison with the initial approach for faults detection in power grid.
arXiv Detail & Related papers (2022-05-13T21:09:41Z) - Learn then Test: Calibrating Predictive Algorithms to Achieve Risk
Control [67.52000805944924]
Learn then Test (LTT) is a framework for calibrating machine learning models.
Our main insight is to reframe the risk-control problem as multiple hypothesis testing.
We use our framework to provide new calibration methods for several core machine learning tasks with detailed worked examples in computer vision.
arXiv Detail & Related papers (2021-10-03T17:42:03Z) - Anomaly Detection in Cybersecurity: Unsupervised, Graph-Based and
Supervised Learning Methods in Adversarial Environments [63.942632088208505]
Inherent to today's operating environment is the practice of adversarial machine learning.
In this work, we examine the feasibility of unsupervised learning and graph-based methods for anomaly detection.
We incorporate a realistic adversarial training mechanism when training our supervised models to enable strong classification performance in adversarial environments.
arXiv Detail & Related papers (2021-05-14T10:05:10Z) - Detection of Dataset Shifts in Learning-Enabled Cyber-Physical Systems
using Variational Autoencoder for Regression [1.5039745292757671]
We propose an approach to detect the dataset shifts effectively for regression problems.
Our approach is based on the inductive conformal anomaly detection and utilizes a variational autoencoder for regression model.
We demonstrate our approach by using an advanced emergency braking system implemented in an open-source simulator for self-driving cars.
arXiv Detail & Related papers (2021-04-14T03:46:37Z) - Interpolation-based semi-supervised learning for object detection [44.37685664440632]
We propose an Interpolation-based Semi-supervised learning method for object detection.
The proposed losses dramatically improve the performance of semi-supervised learning as well as supervised learning.
arXiv Detail & Related papers (2020-06-03T10:53:44Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.