Deep Learning-Based Cyber–Physical Feature Fusion for Anomaly Detection in Industrial Control Systems
Abstract
:1. Introduction
- Based on the latest public ICS dataset, a method for extracting system network features is designed for ICS, and the original physical features are fused with additionally extracted network features to create a cyber–physical dataset with fusion features.
- A model is proposed for unsupervised anomaly detection for ICS based on LSTM-Autoencoder and GAN, which is evaluated using the cyber–physical dataset. In terms of precision, recall, and F1-score, the model outperforms several other methods.
- Both supervised and unsupervised algorithms are used to investigate the effects of additional extracted network features on anomaly detection results. As a result of the experiments performed in this paper, it has been found that the features extracted from the network can significantly improve the performance of the anomaly detection algorithm.
2. Related Work
- (1)
- Studies using physical information. Industrial sensors collect physical data such as water level, temperature, and humidity. Ahmed et al. [18] use the hardware characteristics of the sensor and the physical characteristics of the process to create a unique fingerprint for each sensor. In normal operation, noise-based fingerprints are created and can be used to detect attacks by comparing the differences between the noise pattern and the fingerprint pattern. According to Lin et al. [19], timed automata can be used to learn the laws that govern the change of sensor value. Furthermore, sensor and actuator dependencies are analyzed using a Bayesian network. The method is capable of detecting anomalies and locating the abnormal sensor or actuator. Industrial sensor data can be analyzed based on their time and frequency characteristics. In their study, Nguyen et al. [20] developed a method for detecting outliers in time-frequency data using continuous wavelet transforms. The authors of Zhao et al. [21] proposed a correlation-based method for detecting anomalies using sensor data and the correlations between them. Compared with only using sensor data, their method achieved higher accuracy.
- (2)
- Studies using network traffic. Since ICS networks are more stable than IT networks, abnormal network traffic usually indicates that the system is being attacked. Network traffic-based anomaly detection methods can be further divided into packet-based detection, flow-based detection, and session-based detection [22]. To detect abnormal behavior in ICS, Song et al. [23] extracted the behavioral sequence data from Modbus traffic to model the system’s normal behavior, and compared the actual behavioral data with the model’s predictions. Lee et al. [24] proposed AE-CGAN (autoencoder-conditional GAN) to oversample rare classes on the basis of the GAN model. It is able to achieve more accurate performance metrics in the case of significant imbalance between normal and abnormal traffic. Benaddi et al. [25] used Distributional Reinforcement Learning (DRL) and GAN to help distributional RL-based IDS enhance the detection of minority network attacks and improve the efficiency and robustness of anomaly detection systems in the Industrial Internet of Things (IIoT). By extracting the temporal characteristics of the original traffic in the SCADA system, Kalech et al. [26] proposed a method for detecting network anomalies based on temporal pattern recognition. In order to detect abnormal behavior, Hidden Markov models and artificial neural networks are used. A multi-level anomaly detection scheme combining LSTMs and Bloom filters was proposed by Feng et al. [27] in order to detect malicious traffic in SCADA datasets. An algorithm for detecting anomalous traffic was proposed by Zhang et al. [28]. A grayscale image was created by converting the ICS traffic feature values into grayscale images, and then the model was trained with the resulting grayscale images, which improved the accuracy of anomaly detection.
- In terms of the dataset, the latest ICS public dataset WDT [37] is utilized, which provides data on physical processes and their corresponding network traffic.
- When extracting features, we take into account the physical information and network traffic of ICS.
- Both supervised and unsupervised algorithms are used in the evaluation of performance to determine whether cyber–physical features contribute to the improvement of anomaly detection.
- An unsupervised anomaly detection model based on LSTM-Autoencoder and GAN is proposed, which solves the problem of low recall in past anomaly detection models, and is suitable for the ICS field that does not have sufficient labeled samples.
3. Dataset Description
4. Methodology
4.1. Extraction and Fusion of Additional Network Features
4.2. Problem Formulation
4.3. Proposed Model
4.3.1. Phase 1—Input Reconstruction
4.3.2. Phase 2—Adversarial Training
5. Experiments and Results Analysis
5.1. Experiment Environment and Metrics
5.2. Dataset
5.2.1. Dataset for Supervised Algorithms
5.2.2. Dataset for Unsupervised Algorithms
5.3. Experiments of Using Supervised Algorithms
5.4. Experiments of Unsupervised Algorithms
5.4.1. Performance of the Proposed Model
5.4.2. Comparison with Other Unsupervised Algorithms
5.5. Ablation Experiments
5.6. Discussion
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Siniosoglou, I.; Radoglou-Grammatikis, P.; Efstathopoulos, G.; Fouliras, P.; Sarigiannidis, P. A Unified Deep Learning Anomaly Detection and Classification Approach for Smart Grid Environments. IEEE Trans. Netw. Serv. Manag. 2021, 18, 1137–1151. [Google Scholar] [CrossRef]
- Liu, J.; Lin, X.; Chen, X.; Wen, H.; Li, H.; Hu, Y.; Sun, J.; Shi, Z.; Sun, L. ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks. IEEE Trans. Dependable Secur. Comput. 2022, 19, 2054–2069. [Google Scholar] [CrossRef]
- Khan, R.; Maynard, P.; McLaughlin, K.; Laverty, D.M.; Sezer, S. Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid. In Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research, Swindon, UK, 23–25 August 2016; pp. 53–63. [Google Scholar] [CrossRef] [Green Version]
- Alladi, T.; Chamola, V.; Zeadally, S. Industrial Control Systems: Cyberattack trends and countermeasures. Comput. Commun. 2020, 155, 1–8. [Google Scholar] [CrossRef]
- Fahim, M.; Sillitti, A. Anomaly Detection, Analysis and Prediction Techniques in IoT Environment: A Systematic Literature Review. IEEE Access 2019, 7, 81664–81681. [Google Scholar] [CrossRef]
- Ayodeji, A.; Liu, Y.; Chao, N.; Yang, L. A new perspective towards the development of robust data-driven intrusion detection for industrial control systems. Nucl. Eng. Technol. 2020, 52, 2687–2698. [Google Scholar] [CrossRef]
- Zhang, M.; Qu, H.; Belatreche, A.; Chen, Y.; Yi, Z. A highly effective and robust membrane potential-driven supervised learning method for spiking neurons. IEEE Trans. Neural Netw. Learn. Syst. 2018, 30, 123–137. [Google Scholar] [CrossRef]
- Zhang, M.; Wang, J.; Wu, J.; Belatreche, A.; Amornpaisannon, B.; Zhang, Z.; Miriyala, V.; Qu, H.; Chua, Y.; Carlson, T.; et al. Rectified linear postsynaptic potential function for backpropagation in deep spiking neural networks. IEEE Trans. Neural Netw. Learn. Syst. 2021, 33, 1947–1958. [Google Scholar] [CrossRef]
- Huang, Y.; Wang, D.; Sun, Y.; Hang, B. A fast intra coding algorithm for HEVC by jointly utilizing naive Bayesian and SVM. Multimed. Tools Appl. 2020, 79, 33957–33971. [Google Scholar] [CrossRef]
- Gou, J.; Sun, L.; Yu, B.; Wan, S.; Ou, W.; Yi, Z. Multi-Level Attention-Based Sample Correlations for Knowledge Distillation. IEEE Trans. Ind. Inform. 2022, 1–11, (early access). [Google Scholar] [CrossRef]
- Huang, Y.; Lu, J.; Tang, H.; Liu, X. A Hybrid Association Rule-Based Method to Detect and Classify Botnets. Secur. Commun. Netw. 2021, 2021, 1028878. [Google Scholar] [CrossRef]
- Amer, M.; Goldstein, M.; Abdennadher, S. Enhancing one-class support vector machines for unsupervised anomaly detection. In Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description, Chicago, IL, USA, 11 August 2013; pp. 8–15. [Google Scholar] [CrossRef]
- Liu, F.T.; Ting, K.M.; Zhou, Z. Isolation Forest. In Proceedings of the 2008 Eighth IEEE International Conference on Data Mining, Washington, DC, USA, 15–19 December 2008; pp. 413–422. [Google Scholar] [CrossRef]
- Bank, D.; Koenigstein, N.; Giryes, R. Autoencoders. arXiv 2020, arXiv:2003.05991. [Google Scholar]
- Tuli, S.; Casale, G.; Jennings, N.R. TranAD: Deep Transformer Networks for Anomaly Detection in Multivariate Time Series Data. arXiv 2022, arXiv:2201.07284. [Google Scholar] [CrossRef]
- Cai, Z.; Xiong, Z.; Xu, H.; Wang, P.; Li, W.; Pan, Y. Generative Adversarial Networks. ACM Comput. Surv. 2021, 54, 1–38. [Google Scholar] [CrossRef]
- Provotar, O.I.; Linder, Y.M.; Veres, M.M. Unsupervised Anomaly Detection in Time Series Using LSTM-Based Autoencoders. In Proceedings of the 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine, 18–20 December 2019; pp. 513–517. [Google Scholar] [CrossRef]
- Ahmed, C.M.; Zhou, J.; Mathur, A.P. Noise matters: Using sensor and process noise fingerprint to detect stealthy cyber attacks and authenticate sensors in cps. In Proceedings of the 34th Annual Computer Security Applications Conference, San Juan, PR, USA, 3–7 December 2018; pp. 566–581. [Google Scholar] [CrossRef] [Green Version]
- Lin, Q.; Adepu, S.; Verwer, S.; Mathur, A. TABOR: A graphical model-based approach for anomaly detection in industrial control systems. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security, Incheon, Republic of Korea, 4 June 2018; pp. 525–536. [Google Scholar] [CrossRef]
- Nguyen, L.V.; Kapinski, J.; Jin, X.; Deshmukh, J.; Butts, K.; Johnson, T.T. Abnormal Data Classification Using Time-Frequency Temporal Logic. In Proceedings of the 20th International Conference on Hybrid Systems: Computation and Control, Pittsburgh, PA, USA, 18–20 April 2017; pp. 237–242. [Google Scholar] [CrossRef]
- Zhao, P.; Kurihara, M.; Tanaka, J.; Noda, T.; Chikuma, S.; Suzuki, T. Advanced correlation-based anomaly detection method for predictive maintenance. In Proceedings of the 2017 IEEE International Conference on Prognostics and Health Management (ICPHM), Dallas, TX, USA, 19–21 June 2017; pp. 78–83. [Google Scholar] [CrossRef]
- Liu, H.; Lang, B. Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey. Appl. Sci. 2019, 9, 4396. [Google Scholar] [CrossRef] [Green Version]
- Zhanwei, S.; Zenghui, L. Abnormal detection method of industrial control system based on behavior model. Comput. Secur. 2019, 84, 166–178. [Google Scholar] [CrossRef]
- Lee, J.; Park, K. AE-CGAN Model based High Performance Network Intrusion Detection System. Appl. Sci. 2019, 9, 4221. [Google Scholar] [CrossRef] [Green Version]
- Benaddi, H.; Jouhari, M.; Ibrahimi, K.; Ben Othman, J.; Amhoud, E.M. Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks. Sensors 2022, 22, 8085. [Google Scholar] [CrossRef]
- Kalech, M. Cyber-attack detection in SCADA systems using temporal pattern recognition techniques. Comput. Secur. 2019, 84, 225–238. [Google Scholar] [CrossRef]
- Feng, C.; Li, T.; Chana, D. Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks. In Proceedings of the 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, USA, 26–29 June 2017; pp. 261–272. [Google Scholar] [CrossRef] [Green Version]
- Zhang, Y.; Li, X.; Li, D.; Yang, H. Abnormal flow monitoring of industrial control network based on convolutional neural network. J. Comput. Appl. 2019, 39, 1512. [Google Scholar] [CrossRef]
- Beaver, J.M.; Borges-Hink, R.C.; Buckner, M.A. An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications. In Proceedings of the 2013 12th International Conference on Machine Learning and Applications, Miami, FL, USA, 4–7 December 2013; pp. 54–59. [Google Scholar] [CrossRef]
- Borges Hink, R.C.; Beaver, J.M.; Buckner, M.A.; Morris, T.; Adhikari, U.; Pan, S. Machine learning for power system disturbance and cyber-attack discrimination. In Proceedings of the 2014 7th International Symposium on Resilient Control Systems (ISRCS), Denver, CO, USA, 19–21 August 2013; pp. 1–8. [Google Scholar] [CrossRef]
- Kravchik, M.; Shabtai, A. Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks. In Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, Toronto, ON, Canada, 19 October 2018; pp. 72–83. [Google Scholar] [CrossRef]
- Chang, C.P.; Hsu, W.C.; Liao, I.E. Anomaly Detection for Industrial Control Systems Using K-Means and Convolutional Autoencoder. In Proceedings of the 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 19–21 September 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Audibert, J.; Michiardi, P.; Guyard, F.; Marti, S.; Zuluaga, M.A. USAD: UnSupervised Anomaly Detection on Multivariate Time Series. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Virtual Event, USA, 6–10 July 2020; pp. 3395–3404. [Google Scholar] [CrossRef]
- Lu, H.; Du, M.; Qian, K.; He, X.; Wang, K. GAN-Based Data Augmentation Strategy for Sensor Anomaly Detection in Industrial Robots. IEEE Sens. J. 2022, 22, 17464–17474. [Google Scholar] [CrossRef]
- Li, D.; Chen, D.; Jin, B.; Shi, L.; Goh, J.; Ng, S.K. MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks. In Proceedings of the 28the International conference on artificial neural networks, Munich, Germany, 17–19 September 2020; pp. 703–716. [Google Scholar] [CrossRef] [Green Version]
- Müller, N.; Ziras, C.; Heussen, K. Assessment of Cyber-Physical Intrusion Detection and Classification for Industrial Control Systems. arXiv 2022, arXiv:2202.09352. [Google Scholar]
- Faramondi, L.; Flammini, F.; Guarino, S.; Setola, R. A Hardware-in-the-Loop Water Distribution Testbed Dataset for Cyber-Physical Security Testing. IEEE Access 2021, 9, 122385–122396. [Google Scholar] [CrossRef]
Acquisitions | Description (Scenario Number: 1.1–1.8, 2.1–2.13, 3.1–3.7) |
---|---|
First (Attack 1) | phy_att_1.csv, attack_1.pcap 5 MITM attack scenarios. (1.1, 1.3, 1.5, 1.7, 1.8) 3 physical fault scenarios. (1.2, 1.4, 1.6) |
Second (Attack 2) | phy_att_2.csv, attack_2.pcap 7 scan attack scenarios. (2.1, 2.2, 2.3, 2.4, 2.7, 2.9, 2.11) 3 Dos attack scenarios. (2.5, 2.10, 2.13) 2 physical fault scenarios. (2.6, 2.8) 1 MITM attack scenarios. (2.12) |
Third (Attack 3) | phy_att_3.csv, attack_3.pcap 3 physical fault scenarios. (3.1, 3.3, 3.4) 2 Dos attack scenarios. (3.2, 3.5) 2 MITM attack scenarios. (3.6, 3.7) |
Fourth (Normal) | phy_normal.csv, normal.pcap No attack. |
No. | Features | Description |
---|---|---|
1 | pkt_num | Number of all types of packets |
2 | icmp_pkt_num | Number of ICMP packets |
3 | arp_pkt_num | Number of ARP packets |
4 | tcp_pkt_num | Number of TCP packets |
5 | mb_q_num | Number of MODBUS request packets |
6 | mb_r_num | Number of MODBUS response packets |
7 | avg_pkt_size | Average packet byte size |
8 | avg_payload_size | Average packet payload byte size |
9 | mb_q_avg | Average MODBUS request packet payload byte size |
10 | mb_r_avg | Average MODBUS response packet payload byte size |
11 | illegal_mac | Illegal MAC address appears |
12 | illegal_ip | Illegal IP address appears |
13 | fc1_pkt_num | Number of Modbus packets with function code 1 |
14 | fc3_pkt_num | Number of Modbus packets with function code 3 |
15 | fc5_pkt_num | Number of Modbus packets with function code 5 |
16 | fc6_pkt_num | Number of Modbus packets with function code 6 |
17 | fin_flag_num | Number of packets with FIN in the TCP flag |
18 | syn_flag_num | Number of packets with SYN in the TCP flag |
19 | rst_flag_num | Number of packets with RST in the TCP flag |
20 | psh_flag_num | Number of packets with PSH in the TCP flag |
21 | ack_flag_num | Number of packets with ACK in the TCP flag |
22 | stage | Stage of the current moment in a process cycle |
Dataset | Number of Samples and Features |
---|---|
net_phy_att_1.csv | (2409, 62) |
net_phy_att_2.csv | (2092, 62) |
net_phy_att_3.csv | (1248, 62) |
net_phy_norm.csv | (3421, 62) |
Total samples | 9170 |
Module | Hyperparameter | Value |
---|---|---|
LSTM encoder | Layer of LSTM | 1 |
Input size and hidden size for each layer of LSTM | (62, 128) | |
Dropout | 0.2 | |
LSTM decoder1 and LSTM decoder2 | Layer of LSTM | 1 |
Input size and hidden size for each layer of LSTM | (62, 128) | |
Dropout | 0.2 | |
Layer of Dense | 1 | |
Size of each layer of the Dense | (128, 62) |
Label | Training Set | Testing Set |
---|---|---|
Normal | 5848 | 1864 |
Physical fault | 426 | 385 |
MITM | 358 | 126 |
DoS | 67 | 89 |
Scan | 5 | 2 |
Total | 6704 | 2466 |
Algorithm | Physical Features | Cyber–Physical Features | ||||||
---|---|---|---|---|---|---|---|---|
F1 | P | R | A | F1 | P | R | A | |
RF | 0.257 | 0.754 | 0.155 | 0.777 | 0.907 | 1.000 | 0.831 | 0.958 |
SVM | 0.126 | 0.764 | 0.068 | 0.763 | 0.895 | 1.000 | 0.809 | 0.953 |
NB | 0.196 | 0.276 | 0.151 | 0.690 | 0.878 | 0.982 | 0.795 | 0.945 |
Acquisition | Physical Features | Cyber–Physical Features | ||||||
---|---|---|---|---|---|---|---|---|
F1 | P | R | A | F1 | P | R | A | |
Attack 1 | 0.574 | 0.574 | 0.574 | 0.657 | 0.827 | 0.827 | 0.826 | 0.860 |
Attack 2 | 0.292 | 0.293 | 0.292 | 0.730 | 0.646 | 0.646 | 0.645 | 0.865 |
Attack 3 | 0.029 | 0.143 | 0.016 | 0.667 | 0.692 | 0.957 | 0.542 | 0.851 |
Sum | 0.425 | 0.479 | 0.382 | 0.686 | 0.758 | 0.800 | 0.720 | 0.860 |
Methods | F1 | P | R | A |
---|---|---|---|---|
OC-SVM | 0.489 | 0.324 | 0.999 | 0.364 |
iForest | 0.484 | 0.341 | 0.834 | 0.458 |
USAD | 0.622 | 0.632 | 0.613 | 0.774 |
Proposed model | 0.758 | 0.800 | 0.720 | 0.860 |
Category | Hyperparameter | Value | |
---|---|---|---|
Standard autoencoder | Encoder | Layer of Dense | 2 |
Size of the Dense (W means window size) | (62 × W, 128) | ||
(128, 64) | |||
Dropout, Activation function | 0.1, ReLu | ||
Decoder | Layer of Dense | 2 | |
Size of the Dense (W means window size) | (64, 128) | ||
(128, 62 × W) | |||
Dropout, Activation function | 0.1, ReLu | ||
BiLSTM autoencoder | Encoder | Layer of BiLSTM | 1 |
Input size and hidden size for each layer of BiLSTM | (62, 128) | ||
Dropout | 0.2 | ||
Layer of BiLSTM | 1 | ||
Decoder | Input size and hidden size for each layer of BiLSTM | (62, 128) | |
Dropout | 0.2 | ||
Layer of Dense | 1 | ||
Size of each layer of the Dense | (128, 62) | ||
GRU autoencoder | Encoder | Layer of GRU | 1 |
Input size and hidden size for each layer of GRU | (62, 128) | ||
Dropout | 0.2 | ||
Layer of GRU | 1 | ||
Decoder | Input size and hidden size for each layer of GRU | (62, 128) | |
Dropout | 0.2 | ||
Layer of Dense | 1 | ||
Size of each layer of the Dense | (128, 62) |
Category | F1 | P | R | A |
---|---|---|---|---|
Standard autoencoder | 0.568 | 0.414 | 0.903 | 0.581 |
BiLSTM autoencoder | 0.767 | 0.843 | 0.703 | 0.870 |
GRU autoencoder | 0.729 | 0.888 | 0.618 | 0.860 |
LSTM autoencoder (proposed model) | 0.758 | 0.800 | 0.720 | 0.860 |
Proposed model with no adversarial training | 0.730 | 0.828 | 0.652 | 0.853 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Du, Y.; Huang, Y.; Wan, G.; He, P. Deep Learning-Based Cyber–Physical Feature Fusion for Anomaly Detection in Industrial Control Systems. Mathematics 2022, 10, 4373. https://doi.org/10.3390/math10224373
Du Y, Huang Y, Wan G, He P. Deep Learning-Based Cyber–Physical Feature Fusion for Anomaly Detection in Industrial Control Systems. Mathematics. 2022; 10(22):4373. https://doi.org/10.3390/math10224373
Chicago/Turabian StyleDu, Yan, Yuanyuan Huang, Guogen Wan, and Peilin He. 2022. "Deep Learning-Based Cyber–Physical Feature Fusion for Anomaly Detection in Industrial Control Systems" Mathematics 10, no. 22: 4373. https://doi.org/10.3390/math10224373