Next Article in Journal
Integrating Bayesian Knowledge Tracing and Human Plausible Reasoning in an Adaptive Augmented Reality System for Spatial Skill Development
Previous Article in Journal
No Peace After Death? The Impact of AI-Driven Memorial Chatbots on Privacy and Data Protection
Previous Article in Special Issue
Fusion of Aerial and Satellite Images for Automatic Extraction of Building Footprint Information Using Deep Neural Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Mitigating Impact of Data Poisoning Attacks on CPS Anomaly Detection with Provable Guarantees †

by
Sahar Abedzadeh
and
Shameek Bhattacharjee
*,‡
Computer Science Department, Western Michigan University, Kalamazoo, MI 49008, USA
*
Author to whom correspondence should be addressed.
This article is a revised and expanded version of a paper entitled Insights into [Robust Anomaly based Attack Detection in Smart Grids under Data Poisoning Attacks], which was presented at [8th ACM on Cyber-Physical System Security Workshop (CPSS ’22), Nagasaki, Japan, 30 June 2022].
These authors contributed equally to this work.
Information 2025, 16(6), 428; https://doi.org/10.3390/info16060428
Submission received: 16 February 2025 / Revised: 11 May 2025 / Accepted: 19 May 2025 / Published: 23 May 2025
(This article belongs to the Special Issue Machine Learning and Artificial Intelligence with Applications)

Abstract

Anomaly-based attack detection methods depend on some form of machine learning to detect data falsification attacks in smart living cyber–physical systems. However, there is a lack of studies that consider the presence of attacks during the training phase and their effect on detection and false alarm performance. To improve the robustness of time series learning for anomaly detection, we propose a framework by modifying design choices such as regression error type and loss function type while learning the thresholds for an anomaly detection framework during the training phase. Specifically, we offer theoretical proofs on the relationship between poisoning attack strengths and how that informs the choice of loss functions used to learn the detection thresholds. This, in turn, leads to explainability of why and when our framework mitigates data poisoning and the trade-offs associated with such design changes. The theoretical results are backed by experimental results that prove attack mitigation performance with NIST-specified metrics for CPS, using real data collected from a smart metering infrastructure as a proof of concept. Thus, the contribution is a framework that guarantees security of ML and ML for security simultaneously.
Keywords: anomaly detection; data poisoning attacks; cyber–physical systems (CPS); machine learning robustness; ML for security; resilient learning-based CPS anomaly detection; data poisoning attacks; cyber–physical systems (CPS); machine learning robustness; ML for security; resilient learning-based CPS

Share and Cite

MDPI and ACS Style

Abedzadeh, S.; Bhattacharjee, S. Mitigating Impact of Data Poisoning Attacks on CPS Anomaly Detection with Provable Guarantees. Information 2025, 16, 428. https://doi.org/10.3390/info16060428

AMA Style

Abedzadeh S, Bhattacharjee S. Mitigating Impact of Data Poisoning Attacks on CPS Anomaly Detection with Provable Guarantees. Information. 2025; 16(6):428. https://doi.org/10.3390/info16060428

Chicago/Turabian Style

Abedzadeh, Sahar, and Shameek Bhattacharjee. 2025. "Mitigating Impact of Data Poisoning Attacks on CPS Anomaly Detection with Provable Guarantees" Information 16, no. 6: 428. https://doi.org/10.3390/info16060428

APA Style

Abedzadeh, S., & Bhattacharjee, S. (2025). Mitigating Impact of Data Poisoning Attacks on CPS Anomaly Detection with Provable Guarantees. Information, 16(6), 428. https://doi.org/10.3390/info16060428

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop