Federated Learning-Based Explainable Anomaly Detection for Industrial Control Systems
نویسندگان
چکیده
We are now witnessing the rapid growth of advanced technologies and their application, leading to Smart Manufacturing (SM). The Internet Things (IoT) is one main used enable smart factories, which connecting all industrial assets, including machines control systems, with information systems business processes. Industrial Control Systems IoT-based factories top industries attacked by numerous threats, especially unknown novel attacks. As a result, distributed structure plenty IoT front-end sensing devices in SM, an effectively anomaly detection (AD) architecture for ICSs should: achieve high performance, train learn new data patterns fast time scale, have lightweight be deployed on resource-constrained edge devices. To date, most solutions not fulfilled these requirements. In addition, interpretability why instance predicted abnormal hardly concerned. this paper, we propose so- called FedeX address those challenges. experiments show that outperforms 14 other existing metrics liquid storage set. And Recall 1 F1-score 0.9857, it also SWAT proven terms training about 7.5 minutes hardware requirement memory consumption 14%, allowing us deploy tasks computing infrastructure real-time. Besides, considered as frameworks at forefront interpreting anomalies using XAI, enables experts make quick decisions trust model more.
منابع مشابه
Side-channel based intrusion detection for industrial control systems
Industrial Control Systems are under increased scrutiny. Their security is historically sub-par, and although measures are being taken by the manufacturers to remedy this, the large installed base of legacy systems cannot easily be updated with state-of-the-art security measures. We propose a system that uses electromagnetic side-channel measurements to detect behavioural changes of the softwar...
متن کاملMachine Learning for Host-based Anomaly Detection
Machine Learning for Host-based Anomaly Detection by Gaurav Tandon Dissertation Advisor: Philip K. Chan, Ph.D. Anomaly detection techniques complement signature based methods for intrusion detection. Machine learning approaches are applied to anomaly detection for automated learning and detection. Traditional host-based anomaly detectors model system call sequences to detect novel attacks. This...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کامل3D Gabor Based Hyperspectral Anomaly Detection
Hyperspectral anomaly detection is one of the main challenging topics in both military and civilian fields. The spectral information contained in a hyperspectral cube provides a high ability for anomaly detection. In addition, the costly spatial information of adjacent pixels such as texture can also improve the discrimination between anomalous targets and background. Most studies miss the wort...
متن کاملCommunication Pattern Monitoring: Improving the Utility of Anomaly Detection for Industrial Control Systems
Attacks on Industrial Control Systems (ICS) continue to grow in number and complexity, and well-crafted cyber attacks are aimed at both commodity and ICS-specific contexts. It has become imperative to create efficient ICS-specific defense mechanisms that complement traditional enterprise solutions. Most commercial solutions are not designed for ICS environments, rely only on pre-defined signatu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2022
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2022.3173288