Skip to main content

A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11391))

Abstract

False data Injection attacks is an important security issue in Industrial Control Systems (ICS). Indeed, this kind of attack based on the manipulation and the transmission of corrupted sensing data, can lead to harmful consequences such as disturbing the infrastructure functioning, interrupting it or more again causing its destruction (overheating of a nuclear reactor). In this paper, we propose an unsupervised machine learning approach for false data injection attack detection. It uses a Recurrent Neural Network (RNN) for building a prediction model of expected sensing data. These latter are compared to received values and an alert security is raised if these values differ significantly.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Huang, Y.L., Cárdenas, A., Amin, S., Lin, Z.S., Tsai, H.Y., Sastry, S.: Understanding the physical and economic consequences of attacks on control systems. Int. J. Crit. Infrastruct. Prot. 2(3), 73–83 (2009)

    Article  Google Scholar 

  2. Rubio-Hernán, J., De Cicco, L., García-Alfaro, J.: Revisiting a watermark-based detection scheme to handle cyber-physical attacks. In: Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016 (2016) 21–28

    Google Scholar 

  3. Krotofil, M., Larsen, J., Gollmann, D.: The process matters : ensuring data veracity in cyber-physical systems. In: ACM Symposium on Information, Computer and Communications Security, pp. 133–144 (2015)

    Google Scholar 

  4. Adepu, S., Mathur, A.: Using process invariants to detect cyber attacks on a water treatment system. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IAICT, vol. 471, pp. 91–104. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33630-5_7

    Chapter  Google Scholar 

  5. Linda, O., Vollmer, T., Manic, M.: Neural network based intrusion detection system for critical infrastructures. In: 2009 International Joint Conference on Neural Networks, pp. 1827–1834 (2009)

    Google Scholar 

  6. Gollmann, D.: Veracity, plausibility, and reputation. In: Askoxylakis, I., Pöhls, H.C., Posegga, J. (eds.) WISTP 2012. LNCS, vol. 7322, pp. 20–28. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30955-7_3

    Chapter  Google Scholar 

  7. Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)

    Article  Google Scholar 

  8. Malhotra, P., Ramakrishnan, A., Anand, G., Vig, L., Agarwal, P., Shroff, G.: LSTM-based encoder-decoder for multi-sensor anomaly detection (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lyes Bayou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bayou, L., Espes, D., Cuppens-Boulahia, N., Cuppens, F. (2019). A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems. In: Zemmari, A., Mosbah, M., Cuppens-Boulahia, N., Cuppens, F. (eds) Risks and Security of Internet and Systems. CRiSIS 2018. Lecture Notes in Computer Science(), vol 11391. Springer, Cham. https://doi.org/10.1007/978-3-030-12143-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-12143-3_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-12142-6

  • Online ISBN: 978-3-030-12143-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics