Por favor, use este identificador para citar o enlazar este ítem: https://doi.org/10.1049/ise2.12115

Título: An interpretable semi‐supervised system for detecting cyberattacks using anomaly detection in industrial scenarios
Fecha de publicación: 9-may-2023
Editorial: Wiley Open Access
Cita bibliográfica: IET Information Security, 2023, Vol. 17, pp. 553–566
ISSN: Print: 1751-8709
Electronic: 1751-8717
Palabras clave: Anomaly detection
Deep learning
Explainable artificial intelligence
Industry applications
Machine learning
Root cause analysis
Resumen: When detecting cyberattacks in Industrial settings, it is not sufficient to determine whether the system is suffering a cyberattack. It is also fundamental to explain why the system is under a cyberattack and which are the assets affected. In this context, the Anomaly Detection based on Machine Learning (ML) and Deep Learning (DL) techniques showed great performance when detecting cyberattacks in industrial scenarios. However, two main limitations hinder using them in a real environment. Firstly, most solutions are trained using a supervised approach, which is impractical in the real industrial world. Secondly, the use of black-box ML and DL techniques makes it impossible to interpret the decision made by the model. This article proposes an interpretable and semi-supervised system to detect cyberattacks in Industrial settings. Besides, our proposal was validated using data collected from the Tennessee Eastman Process. To the best of our knowledge, this system is the only one that offers interpretability together with a semi-supervised approach in an industrial setting. Our system discriminates between causes and effects of anomalies and also achieved the best performance for 11 types of anomalies out of 20 with an overall recall of 0.9577, a precision of 0.9977, and a F1-score of 0.9711.
Autor/es principal/es: Perales Gómez, Ángel Luis
Fernández Maimó, Lorenzo
Huertas Celdrán, Alberto
García Clemente, Félix J.
Facultad/Departamentos/Servicios: Facultades, Departamentos, Servicios y Escuelas::Departamentos de la UMU::Ingeniería y Tecnología de Computadores
Versión del editor: https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/ise2.12115
URI: http://hdl.handle.net/10201/142753
DOI: https://doi.org/10.1049/ise2.12115
Tipo de documento: info:eu-repo/semantics/article
Número páginas / Extensión: 14
Derechos: info:eu-repo/semantics/openAccess
Atribución-NoComercial 4.0 Internacional
Descripción: © 2023 The Authors. This manuscript version is made available under the CC-BY-NC 4.0 license http://creativecommons.org/licenses/by-nc/4.0/ This document is the Published version of a Published Work that appeared in final form in IET Information Security. To access the final edited and published work see https://doi.org/10.1049/ise2.12115
Aparece en las colecciones:Artículos: Ingeniería y Tecnología de Computadores



Este ítem está sujeto a una licencia Creative Commons Licencia Creative Commons Creative Commons