An interpretable semi‐supervised system for detecting cyberattacks using anomaly detection in industrial scenarios

نویسندگان

چکیده

When detecting cyberattacks in Industrial settings, it is not sufficient to determine whether the system suffering a cyberattack. It also fundamental explain why under cyberattack and which are assets affected. In this context, Anomaly Detection based on Machine Learning (ML) Deep (DL) techniques showed great performance when industrial scenarios. However, two main limitations hinder using them real environment. Firstly, most solutions trained supervised approach, impractical world. Secondly, use of black-box ML DL makes impossible interpret decision made by model. This article proposes an interpretable semi-supervised detect settings. Besides, our proposal was validated data collected from Tennessee Eastman Process. To best knowledge, only one that offers interpretability together with approach setting. Our discriminates between causes effects anomalies achieved for 11 types out 20 overall recall 0.9577, precision 0.9977, F1-score 0.9711.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Approach for Detecting Self-propagating Email Using Anomaly Detection

This paper develops a new approach for detecting self-propagating email viruses based on statistical anomaly detection. Our approach assumes that a key objective of an email virus attack is to eventually overwhelm mail servers and clients with a large volume of email traffic. Based on this assumption, the approach is designed to detect increases in traffic volume over what was observed during t...

متن کامل

An approach for Anomaly based Intrusion detection System using SNORT

We all know that today we are dependent on computer technologies in any manner. As the use of technology is increases, risk associated with computer technology is also increases. Network security is the big challenge among the researchers. People are working in the field of network security from 1987 when Dorothy Denning published an intrusion detection model [2]. But till now we did not get an...

متن کامل

Anomaly Detection for Industrial Big Data

As the Industrial Internet of Things (IIoTa) grows, systems are increasingly being monitored by arrays of sensors returning time-series data at ever-increasing ‘volume, velocity and variety’b (i.e. Industrial Big Datac). An obvious use for these data is real-time systems condition monitoring and prognostic time to failure analysis (remaining useful life, RUL). (e.g. See white papers by Senseye....

متن کامل

Using Queuing Models for Large System Migration Scenarios - An Industrial Case Study with IBM System z

Large ITorganizations exchange their computer infrastructure on a regular time basis. When planning such an environment exchange, it is required to explicitly consider the impact on the Quality-of-Service of the applications to avoid violations of Service LevelAgreements. In current practice, however, using explicit performance models for such estimations is frequently avoided due to scepticism...

متن کامل

Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection

Deep learning has recently demonstrated state-of-the art performance on key tasks related to the maintenance of computer systems, such as intrusion detection, denial of service attack detection, hardware and software system failures, and malware detection. In these contexts, model interpretability is vital for administrator and analyst to trust and act on the automated analysis of machine learn...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Iet Information Security

سال: 2023

ISSN: ['1751-8709', '1751-8717']

DOI: https://doi.org/10.1049/ise2.12115