Por favor, use este identificador para citar o enlazar este ítem: https://doi.org/10.3390/sym12101583

Título: Madics: A methodology for anomaly detection in industrial control systems
Fecha de publicación: 23-sep-2020
Editorial: MDPI
Cita bibliográfica: Symmetry 2020, 12(10), 1583
Resumen: Industrial Control Systems (ICSs) are widely used in critical infrastructures to support the essential services of society. Therefore, their protection against terrorist activities, natural disasters, and cyber threats is critical. Diverse cyber attack detection systems have been proposed over the years, in which each proposal has applied different steps and methods. However, there is a significant gap in the literature regarding methodologies to detect cyber attacks in ICS scenarios. The lack of such methodologies prevents researchers from being able to accurately compare proposals and results. In this work, we present a Methodology for Anomaly Detection in Industrial Control Systems (MADICS) to detect cyber attacks in ICS scenarios, which is intended to provide a guideline for future works in the field. MADICS is based on a semi-supervised anomaly detection paradigm and makes use of deep learning algorithms to model ICS behaviors. It consists of five main steps, focused on pre-processing the dataset to be used with the machine learning and deep learning algorithms; performing feature filtering to remove those features that do not meet the requirements; feature extraction processes to obtain higher order features; selecting, fine-tuning, and training the most appropriate model; and validating the model performance. In order to validate MADICS, we used the popular Secure Water Treatment (SWaT) dataset, which was collected from a fully operational water treatment plant. The experiments demonstrate that, using MADICS, we can achieve a state-of-the-art precision of 0.984 (as well as a recall of 0.750 and F1-score of 0.851), which is above the average of other works, proving that the proposed methodology is suitable for use in real ICS scenarios.
Autor/es principal/es: Perales Gómez, Ángel Luis
Fernández Maimó, Lorenzo
Huertas Celdrán, Alberto
García Clemente, Félix J.
Facultad/Departamentos/Servicios: Facultades, Departamentos, Servicios y Escuelas::Departamentos de la UMU::Ingeniería y Tecnología de Computadores
Versión del editor: https://www.mdpi.com/2073-8994/12/10/1583
URI: http://hdl.handle.net/10201/142751
DOI: https://doi.org/10.3390/sym12101583
Tipo de documento: info:eu-repo/semantics/article
Derechos: info:eu-repo/semantics/openAccess
Atribución-CompartirIgual 4.0 Internacional
Descripción: © 2020. The authors. This document is made available under the CC-BY-SA 4.0 license http://creativecommons.org/licenses/by-sa /4.0/ This document is the published version of a published work that appeared in final form in Symmetry. To access the final work, see DOI: https://doi.org/10.3390/sym12101583
Aparece en las colecciones:Artículos: Ingeniería y Tecnología de Computadores

Ficheros en este ítem:
Fichero Descripción TamañoFormato 
symmetry-12-01583-5.pdf681,44 kBAdobe PDFVista previa
Visualizar/Abrir


Este ítem está sujeto a una licencia Creative Commons Licencia Creative Commons Creative Commons