Ignitious V. Mboweni, A. Abu-Mahfouz, Daniel T. Ramotsoela
{"title":"供水系统中入侵检测的机器学习方法综述","authors":"Ignitious V. Mboweni, A. Abu-Mahfouz, Daniel T. Ramotsoela","doi":"10.1109/IECON48115.2021.9589237","DOIUrl":null,"url":null,"abstract":"The confidentiality, integrity and availability of critical infrastructure is crucial for any economy to operate efficiently. Water distribution critical infrastructure is a target of many attackers who aim to penetrate the system for malicious reasons. The use of cyber-physical systems (CPSs) in Water Distribution Systems unveils many vulnerabilities that attackers can use. Although preventative security mechanisms are put into place they too can be defeated, and in this case, a second layer of security is essential. Intrusion detection mechanisms are important reactive security mechanisms to limit the damage done by a successful attack in the system. In this paper machine learning (ML) techniques for anomaly detection (AD) are reviewed.","PeriodicalId":443337,"journal":{"name":"IECON 2021 – 47th Annual Conference of the IEEE Industrial Electronics Society","volume":"54 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Machine Learning approach to Intrusion Detection in Water Distribution Systems – A Review\",\"authors\":\"Ignitious V. Mboweni, A. Abu-Mahfouz, Daniel T. Ramotsoela\",\"doi\":\"10.1109/IECON48115.2021.9589237\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The confidentiality, integrity and availability of critical infrastructure is crucial for any economy to operate efficiently. Water distribution critical infrastructure is a target of many attackers who aim to penetrate the system for malicious reasons. The use of cyber-physical systems (CPSs) in Water Distribution Systems unveils many vulnerabilities that attackers can use. Although preventative security mechanisms are put into place they too can be defeated, and in this case, a second layer of security is essential. Intrusion detection mechanisms are important reactive security mechanisms to limit the damage done by a successful attack in the system. In this paper machine learning (ML) techniques for anomaly detection (AD) are reviewed.\",\"PeriodicalId\":443337,\"journal\":{\"name\":\"IECON 2021 – 47th Annual Conference of the IEEE Industrial Electronics Society\",\"volume\":\"54 1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IECON 2021 – 47th Annual Conference of the IEEE Industrial Electronics Society\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IECON48115.2021.9589237\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IECON 2021 – 47th Annual Conference of the IEEE Industrial Electronics Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IECON48115.2021.9589237","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Machine Learning approach to Intrusion Detection in Water Distribution Systems – A Review
The confidentiality, integrity and availability of critical infrastructure is crucial for any economy to operate efficiently. Water distribution critical infrastructure is a target of many attackers who aim to penetrate the system for malicious reasons. The use of cyber-physical systems (CPSs) in Water Distribution Systems unveils many vulnerabilities that attackers can use. Although preventative security mechanisms are put into place they too can be defeated, and in this case, a second layer of security is essential. Intrusion detection mechanisms are important reactive security mechanisms to limit the damage done by a successful attack in the system. In this paper machine learning (ML) techniques for anomaly detection (AD) are reviewed.