Scalable Anomaly Detection and Isolation in Cyber-Physical Systems Using Bayesian Networks

Author(s):  
Sudha Krishnamurthy ◽  
Soumik Sarkar ◽  
Ashutosh Tewari

Anomalies in cyber-physical systems may arise due to malicious cyber attacks or operational faults in the physical devices. Accurately detecting the anomalies and isolating their root-causes is important for identifying appropriate reactive and preventive measures and building resilient cyber-physical systems. Anomaly detection and isolation in cyber-physical systems is challenging, because the impact of a cyber attack on the operation of a physical system may manifest itself only after some time. In this paper, we present a Bayesian network approach for learning the causal relations between cyber and physical variables as well as their temporal correlations from unlabeled data. We describe the data transformations that we performed to deal with the heterogeneous characteristics of the cyber and physical data, so that the integrated dataset can be used to learn the Bayesian network structure and parameters. We then present scalable algorithms to detect different anomalies and isolate their respective root-cause using a Bayesian network. We also present results from evaluating our algorithms on an unlabeled dataset consisting of anomalies due to cyber attacks and physical faults in a commercial building system.

Symmetry ◽  
2020 ◽  
Vol 12 (11) ◽  
pp. 1931
Author(s):  
Dmitry Zegzhda ◽  
Daria Lavrova ◽  
Evgeny Pavlenko ◽  
Anna Shtyrkina

The paper looks at the problem of cybersecurity in modern cyber–physical systems and proposes an evolutionary model approach to counteract cyber attacks by self-regulating the structure of the system, as well as several evolutionary indicators to assess the state of the system. The application of evolutionary models makes it possible to describe the regularities of systems behavior and their technical development, which is especially important regarding cyber attacks, which are the cause of a discontinuous evolution of complex systems. A practical example describes a system behavior during attacks and the self-regulation of its structure. The methodological approach consists of using evolutionary models to describe how modern cyber–physical systems can counteract cyber attacks and evolve, building on the experience of past security incidents. The main conclusions and recommendations are presented in the Discussion section, and they consist of the fact that using an evolutionary approach will not only increase the security of cyber–physical systems, but also define the principles of building systems that are resistant to cyber attacks.


2021 ◽  
Vol 11 (9) ◽  
pp. 4005
Author(s):  
Asep Maulana ◽  
Martin Atzmueller

Anomaly detection in complex networks is an important and challenging task in many application domains. Examples include analysis and sensemaking in human interactions, e.g., in (social) interaction networks, as well as the analysis of the behavior of complex technical and cyber-physical systems such as suspicious transactions/behavior in financial or routing networks; here, behavior and/or interactions typically also occur on different levels and layers. In this paper, we focus on detecting anomalies in such complex networks. In particular, we focus on multi-layer complex networks, where we consider the problem of finding sets of anomalous nodes for group anomaly detection. Our presented method is based on centrality-based many-objective optimization on multi-layer networks. Starting from the Pareto Front obtained via many-objective optimization, we rank anomaly candidates using the centrality information on all layers. This ranking is formalized via a scoring function, which estimates relative deviations of the node centralities, considering the density of the network and its respective layers. In a human-centered approach, anomalous sets of nodes can then be identified. A key feature of this approach is its interpretability and explainability, since we can directly assess anomalous nodes in the context of the network topology. We evaluate the proposed method using different datasets, including both synthetic as well as real-world network data. Our results demonstrate the efficacy of the presented approach.


Author(s):  
Amir Namavar Jahromi ◽  
Hadis Karimipour ◽  
Ali Dehghantanha ◽  
Kim-Kwang Raymond Choo

Economies ◽  
2018 ◽  
Vol 6 (3) ◽  
pp. 39 ◽  
Author(s):  
Majid Ziaei Nafchi ◽  
Hana Mohelská

Industry 4.0 is the essence of the fourth Industrial revolution and is happening right now in manufacturing by using cyber-physical systems (CPS) to reach high levels of automation. Industry 4.0 is especially beneficial in highly developed countries in terms of competitive advantage, but causes unemployment because of high levels of automation. The aim of this paper is to find out if the impact of adopting Industry 4.0 on the labor markets of Iran and Japan would be the same, and to make analysis to find out whether this change is possible for Iran and Japan with their current infrastructures, economy, and policies. With the present situation of Iran in science, technology, and economy, it will be years before Iran could, or better say should, implement Industry 4.0. Japan is able to adopt Industry 4.0 much earlier than Iran and with less challenges ahead; this does not mean that the Japanese labor market would not be affected by this change but it means that those effects would not cause as many difficulties as they would for Iran.


Author(s):  
Ismail Butun ◽  
Patrik Österberg

Interfacing the smart cities with cyber-physical systems (CPSs) improves cyber infrastructures while introducing security vulnerabilities that may lead to severe problems such as system failure, privacy violation, and/or issues related to data integrity if security and privacy are not addressed properly. In order for the CPSs of smart cities to be designed with proactive intelligence against such vulnerabilities, anomaly detection approaches need to be employed. This chapter will provide a brief overview of the security vulnerabilities in CPSs of smart cities. Following a thorough discussion on the applicability of conventional anomaly detection schemes in CPSs of smart cities, possible adoption of distributed anomaly detection systems by CPSs of smart cities will be discussed along with a comprehensive survey of the state of the art. The chapter will discuss challenges in tailoring appropriate anomaly detection schemes for CPSs of smart cities and provide insights into future directions for the researchers working in this field.


Author(s):  
Marco A. Gamarra ◽  
Sachin Shetty ◽  
Oscar R. Gonzalez ◽  
Laurent Njilla ◽  
Marcus Pendleton ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document