Redirigiendo al acceso original de articulo en 16 segundos...
Inicio  /  Algorithms  /  Vol: 16 Par: 2 (2023)  /  Artículo
ARTÍCULO
TITULO

Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation

Olga Tushkanova    
Diana Levshun    
Alexander Branitskiy    
Elena Fedorchenko    
Evgenia Novikova and Igor Kotenko    

Resumen

Cyberattacks on cyber-physical systems (CPS) can lead to severe consequences, and therefore it is extremely important to detect them at early stages. However, there are several challenges to be solved in this area; they include an ability of the security system to detect previously unknown attacks. This problem could be solved with the system behaviour analysis methods and unsupervised or semi-supervised machine learning techniques. The efficiency of the attack detection system strongly depends on the datasets used to train the machine learning models. As real-world data from CPS systems are mostly not available due to the security requirements of cyber-physical objects, there are several attempts to create such datasets; however, their completeness and validity are questionable. This paper reviews existing approaches to attack and anomaly detection in CPS, with a particular focus on datasets and evaluation metrics used to assess the efficiency of the proposed solutions. The analysis revealed that only two of the three selected datasets are suitable for solving intrusion detection tasks as soon as they are generated using real test beds; in addition, only one of the selected datasets contains both network and sensor data, making it preferable for intrusion detection. Moreover, there are different approaches to evaluate the efficiency of the machine learning techniques, that require more analysis and research. Thus, in future research, the authors aim to develop an approach to anomaly detection for CPS using the selected datasets and to conduct experiments to select the performance metrics.

 Artículos similares

       
 
Mohamed ElKashlan, Heba Aslan, Mahmoud Said Elsayed, Anca D. Jurcut and Marianne A. Azer    
The market for Electric Vehicles (EVs) has expanded tremendously as seen in the recent Conference of the Parties 27 (COP27) held at Sharm El Sheikh, Egypt in November 2022. This needs the creation of an ecosystem that is user-friendly and secure. Interne... ver más
Revista: Algorithms

 
Sergii Lysenko, Kira Bobrovnikova, Vyacheslav Kharchenko and Oleg Savenko    
Cybersecurity is a common Internet of Things security challenge. The lack of security in IoT devices has led to a great number of devices being compromised, with threats from both inside and outside the IoT infrastructure. Attacks on the IoT infrastructu... ver más
Revista: Algorithms

 
Bhuvaneswari Amma Narayanavadivoo Gopinathan, Velliangiri Sarveshwaran, Vinayakumar Ravi and Rajasekhar Chaganti    
Cyberattacks have increased as a consequence of the expansion of the Internet of Things (IoT). It is necessary to detect anomalies so that smart devices need to be protected from these attacks, which must be mitigated at the edge of the IoT network. Ther... ver más
Revista: Information

 
Hosam Aljihani, Fathy Eassa, Khalid Almarhabi, Abdullah Algarni and Abdulaziz Attaallah    
With the rapid increase of cyberattacks that presently affect distributed software systems, cyberattacks and their consequences have become critical issues and have attracted the interest of research communities and companies to address them. Therefore, ... ver más
Revista: Applied Sciences

 
Paulo Vitor de Campos Souza, Augusto Junio Guimarães, Thiago Silva Rezende, Vinicius Jonathan Silva Araujo and Vanessa Souza Araujo    
The fuzzy neural networks are hybrid structures that can act in several contexts of the pattern classification, including the detection of failures and anomalous behaviors. This paper discusses the use of an artificial intelligence model based on the ass... ver más
Revista: AI