Skip to main content

A Novel Approach for Detection and Location of Cyber-Attacks in Water Distribution Networks

  • Conference paper
  • First Online:
Progress in Artificial Intelligence and Pattern Recognition (IWAIPR 2021)

Abstract

Most scientific contributions addressing cyber-security issues in water distribution networks present proposals of detection systems and very few propose location systems. A novel methodology for detection and location of cyber-attacks in water distribution networks (WDNs) is proposed in this paper. Structural analysis and autoencoder neural networks are effectively combined with a the control chart Adaptive Exponentially Weighted Moving Average (AEWMA). In the training phase, the proposed detection and location framework only requires data from normal operating conditions and knowledge about the behavioral model of the system which represents an advantage over previous works that demand for additional data of cyber-attacks. Among other advantages of the proposed methodology are the high performance in the effective, robust and early detection and the effectiveness of the location strategy. The proposal was evaluated with the known case study BATADAL.

Project No. 27 of National Program of Research and Innovation ARIA of CITMA, Cuba.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adepu, S., Palleti, V.R., Mishra, G., Mathur, A., et al.: Investigation of cyber attacks on a water distribution system. In: Zhou, J. (ed.) ACNS 2020. LNCS, vol. 12418, pp. 274–291. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-61638-0_16

    Chapter  Google Scholar 

  2. Aly, A., Hamed, R., Mahmoud, M.: Optimal design of the adaptive exponentially weighted moving average control chart over a range of mean shifts. Commun. Stat.-Simul. Comput. 46(2), 890–902 (2015). https://doi.org/10.1080/03610918.2014.983650

    Article  MathSciNet  MATH  Google Scholar 

  3. Baldi, P.: Autoencoders, unsupervised learning, and deep architectures. In: Guyon, I., Dror, G., Lemaire, V., Taylor, G., Silver, D. (eds.) Proceedings of ICML Workshop on Unsupervised and Transfer Learning. Proceedings of Machine Learning Research, vol. 27, pp. 37–49. JMLR Workshop and Conference Proceedings, Bellevue, 02 July 2012

    Google Scholar 

  4. Berglund, E., Pesantez, J., Rasekh, A., Shafiee, M., Sela, L., Haxton, T.: Review of modeling methodologies for managing water distribution security. J. Water Resour. Plan. Manag. 146(8), 1–23 (2020). https://doi.org/10.1061/(ASCE)WR.1943-5452.0001265

    Article  Google Scholar 

  5. Blanke, M., Kinnaert, M., Lunze, J., Staroswiecki, M.: Diagnosis and Fault-Tolerant Control. Springer, Heidelberg (2006). https://doi.org/10.1007/978-3-540-35653-0

    Book  MATH  Google Scholar 

  6. Quiñones Grueiro, M., Llanes-Santiago, O., Prieto Moreno, A., Verde, C.: Decision support system for cyber attack diagnosis in smart water networks. IFAC-PapersOnLine 51(34), 329–334 (2019). https://doi.org/10.1016/j.ifacol.2019.01.024

    Article  Google Scholar 

  7. Krysander, M., Frisk, E.: Sensor placement for fault diagnosis. IEEE Trans. Syst. Man Cybern. - Part A: Syst. Hum. 38(6), 1398–1410 (2008)

    Article  Google Scholar 

  8. Ng, A.: Sparse autoencoder. Technical report, University of Stanford (2010). https://web.stanford.edu/class/cs294a/sparseAutoencoder.pdf

  9. Ostfeld, A., et al.: Battle of the water calibration networks. J. Water Resour. Plann. Manag. 138(5), 523–532 (2012). https://doi.org/10.1061/(ASCE)WR.1943-5452.0000191

    Article  Google Scholar 

  10. Ramotsoela, D.T., Hancke, G.P., Abu-Mahfouz, A.M.: Attack detection in water distribution systems using machine learning. HCIS 9(1), 1–22 (2019). https://doi.org/10.1186/s13673-019-0175-8

    Article  Google Scholar 

  11. Roberts, S.: Control chart tests based on geometric moving averages. Technometrics 1, 239–250 (1959)

    Article  Google Scholar 

  12. Taormina, R., Galelii, S., Tippenhauer, N., Salomons, E., Ostfeld, A.: Characterizing cyber-physical attacks on water distribution systems. J. Water Resour. Plann. Manag. 143(5), 04017009 (2017). https://doi.org/10.1061/(ASCE)WR.1943-5452.0000749

    Article  Google Scholar 

  13. Taormina, R., et al.: The battle of the attack detection algorithms disclosing cyber attacks on water distribution networks. J. Water Resour. Plann. Manag. 144(8), 04018048 (2018). https://doi.org/10.1061/(ASCE)WR.1943-5452.0000749

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Orestes Llanes-Santiago .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rodríguez Martínez, C., Quiñones-Grueiro, M., Verde, C., Llanes-Santiago, O. (2021). A Novel Approach for Detection and Location of Cyber-Attacks in Water Distribution Networks. In: Hernández Heredia, Y., Milián Núñez, V., Ruiz Shulcloper, J. (eds) Progress in Artificial Intelligence and Pattern Recognition. IWAIPR 2021. Lecture Notes in Computer Science(), vol 13055. Springer, Cham. https://doi.org/10.1007/978-3-030-89691-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-89691-1_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-89690-4

  • Online ISBN: 978-3-030-89691-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics