Tracing and detection of ICS Anomalies Based on Causality Mutations
Title | Tracing and detection of ICS Anomalies Based on Causality Mutations |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Zhang, R., Cao, Z., Wu, K. |
Conference Name | 2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC) |
Date Published | June 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-4323-1 |
Keywords | anomaly detection, anomaly detection algorithm, anomaly location strategy, anomaly node, anomaly source traceable, causal anomaly detection, causal modeling algorithm, causal network, causality mining algorithm, causality modeling, causality mutations, comparison algorithm, control engineering computing, Correlation, data mining, Entropy, ICS anomalies, ICS Anomaly Detection, industrial control, industrial control physics, industrial control system, information entropy, Microwave integrated circuits, production engineering computing, pubcrawl, resilience, Resiliency, Scalability, security of data, traceability of anomaly |
Abstract | The algorithm of causal anomaly detection in industrial control physics is proposed to determine the normal cloud line of industrial control system so as to accurately detect the anomaly. In this paper, The causal modeling algorithm combining Maximum Information Coefficient and Transfer Entropy was used to construct the causal network among nodes in the system. Then, the abnormal nodes and the propagation path of the anomaly are deduced from the structural changes of the causal network before and after the attack. Finally, an anomaly detection algorithm based on hybrid differential cumulative is used to identify the specific anomaly data in the anomaly node. The stability of causality mining algorithm and the validity of locating causality anomalies are verified by using the data of classical chemical process. Experimental results show that the anomaly detection algorithm is better than the comparison algorithm in accuracy, false negative rate and recall rate, and the anomaly location strategy makes the anomaly source traceable. |
URL | https://ieeexplore.ieee.org/document/9141597 |
DOI | 10.1109/ITOEC49072.2020.9141597 |
Citation Key | zhang_tracing_2020 |
- Entropy
- traceability of anomaly
- security of data
- Scalability
- Resiliency
- resilience
- pubcrawl
- production engineering computing
- Microwave integrated circuits
- information entropy
- industrial control system
- industrial control physics
- industrial control
- ICS Anomaly Detection
- ICS anomalies
- Anomaly Detection
- Data mining
- Correlation
- control engineering computing
- comparison algorithm
- causality mutations
- causality modeling
- causality mining algorithm
- causal network
- causal modeling algorithm
- causal anomaly detection
- anomaly source traceable
- anomaly node
- anomaly location strategy
- anomaly detection algorithm