Title | ||
---|---|---|
Generating Invariants using Design and Data-centric Approaches for Distributed Attack Detection |
Abstract | ||
---|---|---|
A cyber attack launched on a critical infrastructure (CI), such as a power grid or a water treatment plant, could lead to anomalous behavior. There exist several methods to detect such behavior. This paper reports on a study conducted to compare two methods for detecting anomalies in CI. One of these methods, referred to as design-centric, generates invariants from the design of a CI. Another method, referred to as data-centric, generates the invariants from data collected from an operational CI. The key question that motivated the study is “How do design and data-centric methods compare in the effectiveness of the generated invariants in detecting process anomalies.” The data-centric approach used Association Rule Mining for generating invariants from operational data. These invariants, and their performance in detecting anomalies, was compared against those generated by a design-centric approach reported in the literature. The entire study was conducted in the context of an operational scaled down version of a water treatment plant. |
Year | DOI | Venue |
---|---|---|
2020 | 10.1016/j.ijcip.2020.100341 | International Journal of Critical Infrastructure Protection |
Keywords | DocType | Volume |
Association rule mining,Critical Infrastructure,Cyber-physical attacks,Distributed attack detection,SCADA security,Machine learning,Water treatment plant | Journal | 28 |
ISSN | Citations | PageRank |
1874-5482 | 1 | 0.37 |
References | Authors | |
0 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Muhammad Azmi Umer | 1 | 1 | 1.72 |
Aditya P. Mathur | 2 | 1212 | 122.59 |
Khurum Nazir Junejo | 3 | 57 | 6.08 |
Sridhar Adepu | 4 | 77 | 8.07 |