Title
Generating Invariants using Design and Data-centric Approaches for Distributed Attack Detection
Abstract
A cyber attack launched on a critical infrastructure (CI), such as a power grid or a water treatment plant, could lead to anomalous behavior. There exist several methods to detect such behavior. This paper reports on a study conducted to compare two methods for detecting anomalies in CI. One of these methods, referred to as design-centric, generates invariants from the design of a CI. Another method, referred to as data-centric, generates the invariants from data collected from an operational CI. The key question that motivated the study is “How do design and data-centric methods compare in the effectiveness of the generated invariants in detecting process anomalies.” The data-centric approach used Association Rule Mining for generating invariants from operational data. These invariants, and their performance in detecting anomalies, was compared against those generated by a design-centric approach reported in the literature. The entire study was conducted in the context of an operational scaled down version of a water treatment plant.
Year
DOI
Venue
2020
10.1016/j.ijcip.2020.100341
International Journal of Critical Infrastructure Protection
Keywords
DocType
Volume
Association rule mining,Critical Infrastructure,Cyber-physical attacks,Distributed attack detection,SCADA security,Machine learning,Water treatment plant
Journal
28
ISSN
Citations 
PageRank 
1874-5482
1
0.37
References 
Authors
0
4
Name
Order
Citations
PageRank
Muhammad Azmi Umer111.72
Aditya P. Mathur21212122.59
Khurum Nazir Junejo3576.08
Sridhar Adepu4778.07