A Deep Multi-Modal Cyber-Attack Detection in Industrial Control Systems

04/04/2023
by   Sepideh Bahadoripour, et al.
0

The growing number of cyber-attacks against Industrial Control Systems (ICS) in recent years has elevated security concerns due to the potential catastrophic impact. Considering the complex nature of ICS, detecting a cyber-attack in them is extremely challenging and requires advanced methods that can harness multiple data modalities. This research utilizes network and sensor modality data from ICS processed with a deep multi-modal cyber-attack detection model for ICS. Results using the Secure Water Treatment (SWaT) system show that the proposed model can outperform existing single modality models and recent works in the literature by achieving 0.99 precision, 0.98 recall, and 0.98 f-measure, which shows the effectiveness of using both modalities in a combined model for detecting cyber-attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/04/2019

ICSrange: A Simulation-based Cyber Range Platform for Industrial Control Systems

Maintenance staff of Industrial Control Systems (ICS) is generally not a...
research
09/13/2018

Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems

A hackfest named SWaT Security Showdown (S3) has been organized consecut...
research
12/23/2020

Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems

Recently, neural network (NN)-based methods, including autoencoders, hav...
research
11/30/2019

Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems

Cybersecurity of industrial control system is a very complex and challen...
research
07/02/2019

Efficient Cyber Attacks Detection in Industrial Control Systems Using Lightweight Neural Networks

Industrial control systems (ICSs) are widely used and vital to industry ...
research
06/09/2021

Reinforcement Learning for Industrial Control Network Cyber Security Orchestration

Defending computer networks from cyber attack requires coordinating acti...
research
04/07/2023

SCART: Simulation of Cyber Attacks for Real-Time

Real-Time systems are often implemented as reactive systems that respond...

Please sign up or login with your details

Forgot password? Click here to reset