skip to main content
10.1145/3596871.3596881acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccbnConference Proceedingsconference-collections
research-article

Time series intrusion warning with GAN for missing data in CPS

Authors Info & Claims
Published:20 July 2023Publication History

ABSTRACT

Attacks on Cyber-Physical Systems (CPS) are extremely costly to repair, which is why the early warning is critical for industrial control system security. Previous warning methods have relied heavily on statistical analysis, but such methods struggle to adequately capture the nonlinear relationship between time series data and describe its changing trend. It has limitations in the face of long-term forecasts. This paper analyses the main characteristics of intrusion data in CPS: high dimensionality, data imbalance, and missing data due to few failure samples and sensor failures in highly reliable equipment. Based on the above problem, we propose an intrusion warning system based on missing data, which consists of three modules: data collection module, data interpolation module and intrusion warning module. The improved Generative Adversarial Networks (GAN) model is used to interpolate the missing data and improve the quality of the interpolated data, which is then handed over to the downstream model for intrusion warning. Experiments are conducted on two intrusion datasets collected from CPS. The experimental results show that the model produces more accurate interpolated data and has a high detection rate in intrusion warning work. The proposed data repair and warning method are more applicable to CPS.

References

  1. Alguliyev, R., Imamverdiyev, Y., & Sukhostat, L. (2018). Cyber-physical systems and their security issues. Computers in Industry, 100, 212-223.Google ScholarGoogle Scholar
  2. Thakur, S., Chakraborty, A., De, R., Kumar, N., & Sarkar, R. (2021). Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model. Computers & Electrical Engineering, 91, 107044.Google ScholarGoogle ScholarCross RefCross Ref
  3. Bhamare, D., Zolanvari, M., Erbad, A., Jain, R., Khan, K., & Meskin, N. (2020). Cybersecurity for industrial control systems: A survey. computers & security, 89, 101677.Google ScholarGoogle Scholar
  4. Khalili, A., Sami, A., Khozaei, A., & Pouresmaeeli, S. (2018). SIDS: State-based intrusion detection for stage-based cyber physical systems. International Journal of Critical Infrastructure Protection, 22, 113-124.Google ScholarGoogle Scholar
  5. Jordanov, I., Petrov, N., & Petrozziello, A. (2018). Classifiers accuracy improvement based on missing data imputation. Journal of Artificial Intelligence and Soft Computing Research, 8(1), 31-48.Google ScholarGoogle Scholar
  6. Zhang, Y., Zhou, B., Cai, X., Guo, W., Ding, X., & Yuan, X. (2021). Missing value imputation in multivariate time series with end-to-end generative adversarial networks. Information Sciences, 551, 67-82.Google ScholarGoogle Scholar
  7. Kaiser, J. (2014). Dealing with Missing Values in Data. Journal of Systems Integration (1804-2724), 5(1).Google ScholarGoogle Scholar
  8. Faisal, S., & Tutz, G. (2021). Multiple imputation using nearest neighbor methods. Information Sciences, 570, 500-516.Google ScholarGoogle Scholar
  9. White, I. R., Royston, P., & Wood, A. M. (2011). Multiple imputation using chained equations: issues and guidance for practice. Statistics in medicine, 30(4), 377-399.Google ScholarGoogle Scholar
  10. Che, Z., Purushotham, S., Cho, K., Sontag, D., & Liu, Y. (2018). Recurrent neural networks for multivariate time series with missing values. Scientific reports, 8(1), 6085.Google ScholarGoogle Scholar
  11. Yoon, J., Jordon, J., & Schaar, M. (2018, July). Gain: Missing data imputation using generative adversarial nets. In International conference on machine learning (pp. 5689-5698). PMLR.Google ScholarGoogle Scholar
  12. Neves, D. T., Naik, M. G., & Proença, A. (2021, June). SGAIN, WSGAIN-CP and WSGAIN-GP: Novel GAN methods for missing data imputation. In Computational Science–ICCS 2021: 21st International Conference, Krakow, Poland, June 16–18, 2021, Proceedings, Part I (pp. 98-113). Cham: Springer International Publishing.Google ScholarGoogle Scholar
  13. Cho S, Cho S, Yow K C. A robust time series prediction model using POMDP and data analysis[J]. Journal of Advances in Information Technology (JAIT), 2017.Google ScholarGoogle ScholarCross RefCross Ref
  14. Du, S., Li, T., Yang, Y., & Horng, S. J. (2020). Multivariate time series forecasting via attention-based encoder–decoder framework. Neurocomputing, 388, 269-279.Google ScholarGoogle Scholar
  15. Luo, Y., Cai, X., Zhang, Y., & Xu, J. (2018). Multivariate time series imputation with generative adversarial networks. Advances in neural information processing systems, 31.Google ScholarGoogle Scholar
  16. Arjovsky, M., Chintala, S., & Bottou, L. (2017, July). Wasserstein generative adversarial networks. In International conference on machine learning (pp. 214-223). PMLR.Google ScholarGoogle Scholar
  17. Gao, X., Deng, F., & Yue, X. (2020). Data augmentation in fault diagnosis based on the Wasserstein generative adversarial network with gradient penalty. Neurocomputing, 396, 487-494.Google ScholarGoogle Scholar
  18. Yazdinejad, A., Kazemi, M., Parizi, R. M., Dehghantanha, A., & Karimipour, H. (2022). An ensemble deep learning model for cyber threat hunting in industrial internet of things. Digital Communications and Networks.Google ScholarGoogle Scholar
  19. Lin, W. C., & Tsai, C. F. (2020). Missing value imputation: a review and analysis of the literature (2006–2017). Artificial Intelligence Review, 53, 1487-1509.Google ScholarGoogle Scholar
  20. Cao, W., Wang, D., Li, J., Zhou, H., Li, L., & Li, Y. (2018). Brits: Bidirectional recurrent imputation for time series. Advances in neural information processing systems, 31.Google ScholarGoogle Scholar
  21. Chicco, D., Warrens, M. J., & Jurman, G. (2021). The coefficient of determination R-squared is more informative than SMAPE, MAE, MAPE, MSE and RMSE in regression analysis evaluation. PeerJ Computer Science, 7, e623.Google ScholarGoogle Scholar

Index Terms

  1. Time series intrusion warning with GAN for missing data in CPS
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICCBN '23: Proceedings of the 2023 11th International Conference on Communications and Broadband Networking
          February 2023
          69 pages
          ISBN:9781450398404
          DOI:10.1145/3596871

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 20 July 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited
        • Article Metrics

          • Downloads (Last 12 months)27
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format