YaBeSH Engineering and Technology Library

    • Journals
    • PaperQuest
    • YSE Standards
    • YaBeSH
    • Login
    View Item 
    •   YE&T Library
    • ASCE
    • Journal of Water Resources Planning and Management
    • View Item
    •   YE&T Library
    • ASCE
    • Journal of Water Resources Planning and Management
    • View Item
    • All Fields
    • Source Title
    • Year
    • Publisher
    • Title
    • Subject
    • Author
    • DOI
    • ISBN
    Advanced Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Archive

    Deep-Learning Approach to the Detection and Localization of Cyber-Physical Attacks on Water Distribution Systems

    Source: Journal of Water Resources Planning and Management:;2018:;Volume ( 144 ):;issue: 010
    Author:
    Taormina Riccardo;Galelli Stefano
    DOI: 10.1061/(ASCE)WR.1943-5452.0000983
    Publisher: American Society of Civil Engineers
    Abstract: The recent increase in frequency and severity of cyber-physical attacks on water treatment plants and distribution systems calls for the development of intrusion detection schemes that help protect these critical infrastructures. This paper contributes an algorithm specifically designed for detecting and localizing cyber attacks against water distribution systems. The algorithm builds on the idea of learning a data-driven model that reproduces the patterns of all hydraulic processes observed within a distribution system: the model is trained using data pertaining to normal operating conditions, in order to poorly reproduce anomalous patterns, such as those induced by cyber attacks. The modeling process is carried out using autoencoders, a deep learning neural network architecture capable of building a compressed and meaningful representation of high-dimensional input data patterns. The algorithm is developed and tested on three data sets devised for the Battle of the Attack Detection Algorithms—the only open-source data available, at this stage, for research in cyber security of water networks. Results show that the detection algorithm can identify all attacks featured in the data sets, including those compromising data integrity. The algorithm has two additional important features: it localizes the components under attack, and it is developed using only data pertaining to normal operating conditions, which are generally available to water utilities.
    • Download: (1.369Mb)
    • Show Full MetaData Hide Full MetaData
    • Get RIS
    • Item Order
    • Go To Publisher
    • Price: 5000 Rial
    • Statistics

      Deep-Learning Approach to the Detection and Localization of Cyber-Physical Attacks on Water Distribution Systems

    URI
    http://yetl.yabesh.ir/yetl1/handle/yetl/4248172
    Collections
    • Journal of Water Resources Planning and Management

    Show full item record

    contributor authorTaormina Riccardo;Galelli Stefano
    date accessioned2019-02-26T07:36:05Z
    date available2019-02-26T07:36:05Z
    date issued2018
    identifier other%28ASCE%29WR.1943-5452.0000983.pdf
    identifier urihttp://yetl.yabesh.ir/yetl1/handle/yetl/4248172
    description abstractThe recent increase in frequency and severity of cyber-physical attacks on water treatment plants and distribution systems calls for the development of intrusion detection schemes that help protect these critical infrastructures. This paper contributes an algorithm specifically designed for detecting and localizing cyber attacks against water distribution systems. The algorithm builds on the idea of learning a data-driven model that reproduces the patterns of all hydraulic processes observed within a distribution system: the model is trained using data pertaining to normal operating conditions, in order to poorly reproduce anomalous patterns, such as those induced by cyber attacks. The modeling process is carried out using autoencoders, a deep learning neural network architecture capable of building a compressed and meaningful representation of high-dimensional input data patterns. The algorithm is developed and tested on three data sets devised for the Battle of the Attack Detection Algorithms—the only open-source data available, at this stage, for research in cyber security of water networks. Results show that the detection algorithm can identify all attacks featured in the data sets, including those compromising data integrity. The algorithm has two additional important features: it localizes the components under attack, and it is developed using only data pertaining to normal operating conditions, which are generally available to water utilities.
    publisherAmerican Society of Civil Engineers
    titleDeep-Learning Approach to the Detection and Localization of Cyber-Physical Attacks on Water Distribution Systems
    typeJournal Paper
    journal volume144
    journal issue10
    journal titleJournal of Water Resources Planning and Management
    identifier doi10.1061/(ASCE)WR.1943-5452.0000983
    page4018065
    treeJournal of Water Resources Planning and Management:;2018:;Volume ( 144 ):;issue: 010
    contenttypeFulltext
    DSpace software copyright © 2002-2015  DuraSpace
    نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
    yabeshDSpacePersian
     
    DSpace software copyright © 2002-2015  DuraSpace
    نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
    yabeshDSpacePersian