Abstract
The appearance of the smart houses, buildings, and cities has defined new attack scenarios targeting industrial information systems. The paper suggests a visualization-driven approach to the analysis of the data from heating, ventilating and conditioning system (HVAC). The key element of the approach is the RadViz visualization that is used to form daily operation patterns and can detect suspicious deviations that could be the signs of fraudulent activity in the system. It is supplemented by a matrix-based representation of the HVAC parameters that is constructed in the way that allows highlighting changes in values of parameters being analyzed. The distinctive feature of the proposed visualization models is the ability to display data from different data sources. To demonstrate and evaluate the efficiency of the proposed approach we used the VAST MiniChallenge-2 2016 data set that contains logs from the HVAC system and the access control system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ciholas, P., Lennie, A., Sadigova, P., Such, J.M.: The security of smart buildings: a systematic literature review. https://arxiv.org/abs/1901.05837v3. Accessed 28 Jan 2019
Mirsky, Y., Guri, M., Elovici, Y.: HVACKer: bridging the air-gap by attacking the air conditioning system https://arxiv.org/abs/1703.10454. Accessed 9 Aug 2019
Mundt, P., Wickboldt, P.: Security in building automation systems-a first analysis. In: International Conference On Cyber Security And Protection of Digital Services (Cyber Security), pp. 1–8. IEEE (2016)
Caviglione, L., Lalande, J.-F., Mazurczyk, W., Wendzel, S.: Analysis of human awareness of security and privacy threats in smart environments. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2015. LNCS, vol. 9190, pp. 165–177. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-20376-8_15
Truong, H., Francisco, A., Khosrowpour, A., Taylor, J.E., Mohammadi, N.: Method for visualizing energy use in building information models. Energy Proc. 142, 2541–2546 (2017). https://doi.org/10.1016/j.egypro.2017.12.089
Palm, J., Ellegård, K.: Visualizing energy consumption activities as a tool for developing effective policy. Int. J. Consum. Stud. (2011). https://doi.org/10.1111/j.1470-6431.2010.00974.x
Abdelalim, A., O’Brien, W., Shi, Z.: Development of sankey diagrams to visualize real HVAC performance. Energy Build. 149, 282–297 (2017). https://doi.org/10.1016/j.enbuild.2017.05.040
Janetzko, H., Stoffel, F., Mittelstädt, A., Keim, D.A.: Anomaly detection for visual analytics of power consumption data. Comput. Graph. (2014). https://doi.org/10.1016/j.cag.2013.10.006
Novikova, E.S., Murenin, I.N., Shorov, A.V.: Visualizing anomalous activity in the movement of critical infrastructure employees. In: Proceedings of IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), St. Petersburg, pp. 504–509 (2017)
Novikova, E., Kotenko, I.: Analytical visualization techniques for security information and event management. In: Proceedings of 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing Belfast, Ireland, pp. 519–525 (2013)
Kolomeets, M., Chechulin, A., Kotenko, I., Chevalier, Y.: A visual analytics approach for the cyber forensics based on different views of the network traffic. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 9(2), 57–73 (2018)
Song, H., Muelder, C.W., Ma, K.-L.: Crucial nodes centric visual monitoring and analysis of computer networks. In: Proceedings of the 2012 International Conference on Cyber Security (CYBERSECURITY 2012). IEEE Computer Society, Washington (2012) https://doi.org/10.1109/CyberSecurity.2012.9
Zhao, Y., Zhou, F., Fan, X.: A real-time visualization framework for IDS alerts. In: Proceedings of the 5th International Symposium on Visual Information Communication and Interaction (VINCI 2012). ACM, New York (2012) https://doi.org/10.1145/2397696.2397698
Arendt, D.L., et al.: Ocelot: user-centered design of a decision support visualization for network quarantine. In: Proceedings of 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), Chicago, IL (2015). https://doi.org/10.1109/VIZSEC.2015.7312763
Chen, S., Guo, C., Yuan, X., Merkle, F., Schaefer, H., Ertl, T.: OCEANS: online collaborative explorative analysis on network security. In: Proceedings of the Eleventh Workshop on Visualization for Cyber Security (VizSec 2014). ACM, New York (2014). https://doi.org/10.1145/2671491.267149
Humphries, C., Prigent, N., Bidan, C.E., Majorczyk, F.: CORGI: combination, organization and reconstruction through graphical interactions. In: Proceedings of the Eleventh Workshop on Visualization for Cyber Security (VizSec 2014). ACM, New York (2014). https://doi.org/10.1145/2671491.2671494
Cappers, B.C.M., van Wijk, J.: SNAPS: semantic network traffic analysis through projection and selection. In: Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec 2015), pp. 1–8 (2015). https://doi.org/10.1109/VIZSEC.2015.7312768
Landstorfer, J., Herrmann, I., Stange, J., Dork, M., Wettach, R.: Weaving a carpet from log entries: a network security visualization built with cocreation. In: Proceedings of Visual Analytics Science and Technology (VAST). IEEE (2014)
Mansmann, F., Meier, L., Keim, D.A.: Visualization of host behavior for network security. In: Goodall, J.R., Conti, G., Ma, K.L. (eds.) VizSEC 2007. Mathematics and Visualization, pp. 187–202. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78243-8_13
Novikova, E., Kotenko, I.: Visual analytics for detecting anomalous activity in mobile money transfer services. In: Teufel, S., Min, T.A., You, I., Weippl, E. (eds.) CD-ARES 2014. LNCS, vol. 8708, pp. 63–78. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10975-6_5
Ankerst, M., Berchtold, S., Keim, D.A.: Similarity clustering of dimensions for an enhanced visualization of multidimensional data. In: Proceedings 1998 IEEE Symposium on Information Visualization (INFOVIS 1998), pp. 52–60. IEEE Computer Society (1998)
Hout, M.C., Papesh, M.H., Goldinger, S.D.: Multidimensional scaling. WIREs Cogn. Sci. 4, 93–103. https://doi.org/10.1002/wcs.1203
van der Maaten, L.J.P., Hinton, G.E.: Visualizing high-dimensional data using t-SNE. J. Mach. Learn. Res. 9(Nov), 2579–2605 (2008)
Kohonen, T., Honkela, T.: Kohonen network. Scholarpedia 2(1), 1568 (2007)
Di Caro, L., Frias-Martinez, V., Frias-Martinez, E.: Analyzing the role of dimension arrangement for data visualization in radviz. In: Zaki, M.J., Yu, J.X., Ravindran, B., Pudi, V. (eds.) PAKDD 2010. LNCS, vol. 6119, pp. 125–132. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13672-6_13
Ester, M., Kriegel, H.-P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters a density-based algorithm for discovering clusters in large spatial databases with noise. In: Simoudis, E., Han, J., Fayyad, U. (eds.) Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD 1996), pp. 226–231. AAAI Press (1996)
Vast Challenge Homepage. http://vacommunity.org/. Accessed 10 Aug 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Novikova, E., Bestuzhev, M., Kotenko, I. (2020). Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach. In: Katsikas, S., et al. Computer Security. CyberICPS SECPRE SPOSE ADIoT 2019 2019 2019 2019. Lecture Notes in Computer Science(), vol 11980. Springer, Cham. https://doi.org/10.1007/978-3-030-42048-2_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-42048-2_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-42047-5
Online ISBN: 978-3-030-42048-2
eBook Packages: Computer ScienceComputer Science (R0)