Next Article in Journal
Simplified Indirect Estimation of Pump Flow Discharge: An Example from Serbia
Previous Article in Journal
Simulation of Pan-Evaporation Using Penman and Hamon Equations and Artificial Intelligence Techniques
Previous Article in Special Issue
Smart Urban Water Networks: Solutions, Trends and Challenges
Open AccessFeature PaperArticle

Cyber-Attack Detection in Water Distribution Systems Based on Blind Sources Separation Technique

1
Hydraulic Engineering and Water Resources Department, School of Engineering, Federal University of Minas Gerais, Belo Horizonte 31270-901, Brazil
2
Fluing-Institute for Multidisciplinary Mathematics, Universitat Politècnica de València, 46022 Valencia, Spain
3
Laboratory of Computational Hydraulics, School of Civil Engineering, Architecture and Urban Design, University of Campinas, Campinas 13083-889, Brazil
*
Author to whom correspondence should be addressed.
Academic Editors: Marco Franchini and Francesco De Paola
Water 2021, 13(6), 795; https://doi.org/10.3390/w13060795
Received: 30 December 2020 / Revised: 8 March 2021 / Accepted: 11 March 2021 / Published: 14 March 2021
(This article belongs to the Special Issue Smart Urban Water Networks)
Service quality and efficiency of urban systems have been dramatically boosted by various high technologies for real-time monitoring and remote control, and have also gained privileged space in water distribution. Monitored hydraulic and quality parameters are crucial data for developing planning, operation and security analyses in water networks, which makes them increasingly reliable. However, devices for monitoring and remote control also increase the possibilities for failure and cyber-attacks in the systems, which can severely impair the system operation and, in extreme cases, collapse the service. This paper proposes an automatic two-step methodology for cyber-attack detection in water distribution systems. The first step is based on signal-processing theory, and applies a fast Independent Component Analysis (fastICA) algorithm to hydraulic time series (e.g., pressure, flow, and tank level), which separates them into independent components. These components are then processed by a statistical control algorithm for automatic detection of abrupt changes, from which attacks may be disclosed. The methodology is applied to the case study provided by the Battle of Attack Detection Algorithms (BATADAL) and the results are compared with seven other approaches, showing excellent results, which makes this methodology a reliable early-warning cyber-attack detection approach. View Full-Text
Keywords: water distribution systems; cyber-attack detection; blind sources separation; FastICA water distribution systems; cyber-attack detection; blind sources separation; FastICA
Show Figures

Figure 1

MDPI and ACS Style

Brentan, B.; Rezende, P.; Barros, D.; Meirelles, G.; Luvizotto, E., Jr.; Izquierdo, J. Cyber-Attack Detection in Water Distribution Systems Based on Blind Sources Separation Technique. Water 2021, 13, 795. https://doi.org/10.3390/w13060795

AMA Style

Brentan B, Rezende P, Barros D, Meirelles G, Luvizotto E Jr., Izquierdo J. Cyber-Attack Detection in Water Distribution Systems Based on Blind Sources Separation Technique. Water. 2021; 13(6):795. https://doi.org/10.3390/w13060795

Chicago/Turabian Style

Brentan, Bruno; Rezende, Pedro; Barros, Daniel; Meirelles, Gustavo; Luvizotto, Edevar, Jr.; Izquierdo, Joaquín. 2021. "Cyber-Attack Detection in Water Distribution Systems Based on Blind Sources Separation Technique" Water 13, no. 6: 795. https://doi.org/10.3390/w13060795

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop