{"title":"安全水处理中基于邻近点的异常检测","authors":"Ermiyas Birihanu, Áron Barcsa-Szabó, I. Lendák","doi":"10.1109/CITDS54976.2022.9914316","DOIUrl":null,"url":null,"abstract":"Industrial Control Systems (ICSs) utilize different sensors and various embedded systems to operate. Devices often communicate using protocols like Siemens Step 7 and Modbus, which were designed for use in closed networks many years ago and are vulnerable to attacks. The goal of this study is to detect anomalies in industrial control systems using a proximity-based approach on the Securing Water Treatment (SWaT) dataset. We encoded categorical data using one hot encoding and normalized numerical data using min max scaling. The experiment shown that by adopting a proximity-based approach, we can obtain state-of-the-art 99% precision and 98% recall and able to identify 35 out of 37 attack points, indicating that the suggested methodology is suitable for usage in industrial control system scenarios.","PeriodicalId":271992,"journal":{"name":"2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Proximity-based anomaly detection in Securing Water Treatment\",\"authors\":\"Ermiyas Birihanu, Áron Barcsa-Szabó, I. Lendák\",\"doi\":\"10.1109/CITDS54976.2022.9914316\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Industrial Control Systems (ICSs) utilize different sensors and various embedded systems to operate. Devices often communicate using protocols like Siemens Step 7 and Modbus, which were designed for use in closed networks many years ago and are vulnerable to attacks. The goal of this study is to detect anomalies in industrial control systems using a proximity-based approach on the Securing Water Treatment (SWaT) dataset. We encoded categorical data using one hot encoding and normalized numerical data using min max scaling. The experiment shown that by adopting a proximity-based approach, we can obtain state-of-the-art 99% precision and 98% recall and able to identify 35 out of 37 attack points, indicating that the suggested methodology is suitable for usage in industrial control system scenarios.\",\"PeriodicalId\":271992,\"journal\":{\"name\":\"2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)\",\"volume\":\"160 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CITDS54976.2022.9914316\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CITDS54976.2022.9914316","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Proximity-based anomaly detection in Securing Water Treatment
Industrial Control Systems (ICSs) utilize different sensors and various embedded systems to operate. Devices often communicate using protocols like Siemens Step 7 and Modbus, which were designed for use in closed networks many years ago and are vulnerable to attacks. The goal of this study is to detect anomalies in industrial control systems using a proximity-based approach on the Securing Water Treatment (SWaT) dataset. We encoded categorical data using one hot encoding and normalized numerical data using min max scaling. The experiment shown that by adopting a proximity-based approach, we can obtain state-of-the-art 99% precision and 98% recall and able to identify 35 out of 37 attack points, indicating that the suggested methodology is suitable for usage in industrial control system scenarios.