4.6 Article

USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2022.3143493

Keywords

Data models; Monitoring; Computer crime; Mathematical models; Deep learning; Australia; Representation learning; Misbehaviour detection; cybersecurity; deep learning; cyber-physical systems; industrial Internet of Things

Ask authors/readers for more resources

This article proposes a framework called UnSupervised Misbehaviour Detection (USMD) that uses a deep neural network and long-short term memory method to monitor and identify attacks on CPSs in real-time. Experimental results show that USMD outperforms six state-of-the-art methods on various datasets.
Cyber-Physical Systems (CPSs) enable Information Technology to be integrated with Operation Technology to efficiently monitor and manage the physical processes of various critical infrastructures. Recent incidents in cyber ecosystems have shown that CPSs are becoming increasingly vulnerable to complex attacks. These incidents often lead to sensing and actuation misbehaviour by illegal manipulations of data, which can severely impact the underlying physical processes of critical infrastructures. Current research acknowledges that IT-based security measures cannot entirely protect CPSs from such threats. Moreover, they are not designed to monitor the measurement level activities of physical processes, and they fail to mitigate blended cyberattacks, especially multi-stage and zero-day ones. This article addresses these limitations by proposing a framework, named UnSupervised Misbehaviour Detection (USMD), comprising a deep neural network that learns about a system's expected behaviour from data-driven representations. USMD can identify in real-time the attacks on CPSs by using the long-short term memory and Attention method for multi-sensor data. The USMD's performance is evaluated on various known data sets (i.e., ToN_IoT, SWaT, WADI and Gas pipeline datasets). The experimental results indicate that the superior performance of USMD compared with six state-of-the-art methods, which we implemented and extensively tested. USMD achieves F-scores of 0.9699 and 0.9702 on SWaT and WADI datasets, respectively.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Software Engineering

Energy efficient resource controller for Apache Storm

MohammadReza HoseinyFarahabady, Javid Taheri, Albert Y. Zomaya, Zahir Tari

Summary: This article presents a CPU throttling control strategy to optimize the energy consumption of the Apache Storm platform, and validates its effectiveness in a multi-core system.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2023)

Article Computer Science, Information Systems

Trustworthy Deep Neural Network for Inferring Anticancer Synergistic Combinations

Muhammad A. Alsherbiny, Ibrahim Radwan, Nour Moustafa, Deep Jyoti Bhuyan, Muath El-Waisi, Dennis Chang, Chun Guang Li

Summary: In this paper, a deep learning-based model, SynPredict, is proposed to effectively predict the synergy and sensitivity score of chemotherapeutic drug combinations. By fusing the gene expression data of cancer cells and the chemical features of drugs, SynPredict evaluates the combinations in five synergy metrics. The experimental results demonstrate that SynPredict outperforms existing predictive models with a 74% decrease in mean square error. Moreover, the study highlights the importance of considering multiple synergy metrics and combination sensitivity in predictive models.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2023)

Article Computer Science, Theory & Methods

Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey

Wael Issa, Nour Moustafa, Benjamin Turnbull, Nasrin Sohrabi, Zahir Tari

Summary: The Internet of Things (IoT) ecosystem connects physical devices to the internet, offering agility, responsiveness, and potential environmental benefits. Deep learning (DL) algorithms are integrated into IoT applications to learn and infer patterns. However, current IoT paradigms rely on centralized storage and computing, causing scalability, security threats, and privacy breaches. Federated learning (FL) helps preserve data privacy, but faces challenges related to vulnerabilities and attacks. This study reviews blockchain-based FL methods for securing IoT systems, addressing security issues and open research questions, and discussing challenges and risks associated with integrating blockchain and FL in IoT.

ACM COMPUTING SURVEYS (2023)

Review Computer Science, Theory & Methods

False data injection threats in active distribution systems: A comprehensive survey

Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss

Summary: This paper presents a comprehensive survey of recent advances in False Data Injection (FDI) attacks within active distribution systems in smart grids. It proposes a taxonomy to classify the FDI threats and summarizes the related studies in terms of attack methodologies and implications on electrical power distribution networks. It also identifies research gaps and recommends future research directions.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Computer Science, Information Systems

Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection

Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann

Summary: In this paper, a collaborative cyber threat intelligence sharing scheme is proposed to design and evaluate a robust ML-based network intrusion detection system using heterogeneous network data samples from different organisations. The scheme utilizes a common format for network data traffic and a federated learning mechanism to protect sensitive users' information. The proposed framework is able to effectively classify various traffic types from multiple organisations without the need for inter-organisational data exchange.

JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT (2023)

Article Computer Science, Theory & Methods

A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids

Haftu Tasew Reda, Adnan Anwar, Abdun Naser Mahmood, Zahir Tari

Summary: This article presents a comprehensive review of defense countermeasures against false data injection attacks in the Smart Grid. The theoretical and practical significance of relevant existing literature in Smart Grid cybersecurity is evaluated and compared. The study identifies technical limitations of existing false data attack detection research and recommends future research directions.

ACM COMPUTING SURVEYS (2023)

Article Computer Science, Software Engineering

Serverless Vehicular Edge Computing for the Internet of Vehicles

Faisal Alam, Adel N. Toosi, Muhammad Aamir Cheema, Claudio Cicconetti, Pablo Serrano, Alesandru Iosup, Zahir Tari, Majid Sarvi

Summary: Rapid growth in popularity of smart vehicles and increasing demand for vehicle autonomy presents new opportunities for vehicular edge computing (VEC). However, VEC offloading poses resource management challenges and is largely inaccessible to automotive companies. This work proposes serverless VEC as an execution paradigm for Internet of Vehicles applications and analyzes its benefits, drawbacks, and technology gaps. Emulation is proposed as a methodology for designing and evaluating serverless VEC solutions, and our toolkit validates the feasibility of serverless VEC for real-world traffic scenarios.

IEEE INTERNET COMPUTING (2023)

Article Engineering, Civil

DeepCog: A Trustworthy Deep Learning-Based Human Cognitive Privacy Framework in Industrial Policing

Francesco Schiliro, Nour Moustafa, Imran Razzak, Amin Beheshti

Summary: This paper presents a deep learning-based human cognitive privacy framework called DeepCog, which protects user privacy through feature transforming normalization. Experimental results show that the framework achieves an accuracy of 93.4%, outperforming other techniques.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Information Systems

An explainable deep learning-enabled intrusion detection framework in IoT networks

Marwa Keshk, Nickolaos Koroniotis, Nam Pham, Nour Moustafa, Benjamin Turnbull, Albert Y. Zomaya

Summary: Although XAI has gained significant interest, its implementation in cyber security applications needs further investigation. This paper proposes a novel explainable intrusion detection framework for IoT networks, using a LSTM model and a novel SPIP framework for training and evaluating the model. The SPIP framework achieves high detection accuracy, processing time, and interpretability of data features and model outputs.

INFORMATION SCIENCES (2023)

Proceedings Paper Computer Science, Information Systems

Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System

Ziaur Rahman, Xun Yi, Ibrahim Khalil, Adnan Anwar, Shantanu Pal

Summary: In recent years, false data injection attacks on intelligent connected vehicles have caused significant industrial losses and loss of lives. Conventional centralized techniques can be misused to maliciously update the legitimate status of vehicles. However, the combination of blockchain and fuzzy logic intelligence shows potential in solving localization issues, trust, and false data detection challenges in autonomous vehicular systems.

THIRD INTERNATIONAL WORKSHOP ON ADVANCED SECURITY ON SOFTWARE AND SYSTEMS, ASSS 2023 (2023)

Article Engineering, Electrical & Electronic

Data-driven Approach for State Prediction and Detection of False Data Injection Attacks in Smart Grid

Haftu Tasew Reda, Adnan Anwar, Abdun Mahmood, Naveen Chilamkurti

Summary: In a smart grid, state estimation is an important component for energy management system, including system SE and anomaly detection. Conventional SE techniques are vulnerable to FDI attack, but this paper proposes a new FDI attack detection technique using a data-driven SE model, which has advantages in maintaining temporal correlations, learning actual power system states, and detecting stealthy attacks. Experimental results show that this technique has a higher detection rate with reduced false alarms.

JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY (2023)

No Data Available