Cyber-Attack Detection in Water Distribution Systems Based on Blind Sources Separation Technique

نویسندگان

چکیده

Service quality and efficiency of urban systems have been dramatically boosted by various high technologies for real-time monitoring remote control, also gained privileged space in water distribution. Monitored hydraulic parameters are crucial data developing planning, operation security analyses networks, which makes them increasingly reliable. However, devices control increase the possibilities failure cyber-attacks systems, can severely impair system and, extreme cases, collapse service. This paper proposes an automatic two-step methodology cyber-attack detection distribution systems. The first step is based on signal-processing theory, applies a fast Independent Component Analysis (fastICA) algorithm to time series (e.g., pressure, flow, tank level), separates into independent components. These components then processed statistical abrupt changes, from attacks may be disclosed. applied case study provided Battle Attack Detection Algorithms (BATADAL) results compared with seven other approaches, showing excellent results, this reliable early-warning approach.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique

Based on frequency-domain transformation technique, this paper proposes an attack detection scheme for stochastic control systems under stochastic cyber-attacks and disturbances. The focus is on designing an anomaly detector for the stochastic control systems. First, we construct a model of stochastic control system with stochastic cyber-attacks which satisfy the Markovian stochastic process. A...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

Blind Separation of Jointly Stationary Correlated Sources

The separation of unobserved sources from mixed observed data is a fundamental signal processing problem. Most of the proposed techniques for solving this problem rely on independence or at least uncorrelation assumption for source signals. This paper introduces a technique for cases that source signals are correlated with each other. The method uses Wold decomposition principle for extracting ...

متن کامل

Calculation of Leakage in Water Supply Network Based on Blind Source Separation Theory

The economic and environmental losses due to serious leakage in the urban water supply network have increased the effort to control the water leakage. However, current methods for leakage estimation are inaccurate leading to the development of ineffective leakage controls. Therefore, this study proposes a method based on the blind source separation theory (BSS) to calculate the leakage of water...

متن کامل

Blind Separation of Convolved Sources Based on Information Maximization

Blind separation of independent sources from their convolutive mixtures is a problem in many real world multi-sensor applications. In this paper we present a solution to this problem based on the information maximization principle, which was recently proposed by Bell and Sejnowski for the case of blind separation of instantaneous mixtures. We present a feedback network architecture capable of c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Water

سال: 2021

ISSN: ['2073-4441']

DOI: https://doi.org/10.3390/w13060795