Deep Learning Algorithm using Transfer-Entropy measures for Anomaly Detection in Cyber-Physical Systems
Keywords:Cyber-Physical Systems, Cyber Attacks, Transfer-Entropy, ANN, DNN, Causality Countermeasures.
Generally, in cyber-physical systems, there are various attacks detected such as internet-based load altering attacks, False-Data Injection Attack (FDIA), stealthy deception attacks, covert attacks, time synchronization attacks, etc. Over the past decades, attack detection and secure control system design has a high interest due to the rapid growth of cyber security challenges by sophisticated attacks in cyber-physical system like Internet-of-Things (IoT). Among various techniques, Transfer Entropy Measure (TEM) was introduced to detect four types of attacks like Denial-of-Service (DoS), replay, innovation-based deception attack and data injection attacks. Since, it discovers the interaction behavior among pairs of entities generating by each cyber-physical systems. As well, conventional machine-learning based attack detection mechanisms have been successfully employed in IoT i.e., wireless sensors to detect cyber-attacks. However, such mechanisms have less accuracy and scalability with high computational complexity. Hence in this article, a novel distributed deep learning algorithm is proposed for cyber attack detection in IoT since deep learning algorithms try to learn high-level features from data in an incremental manner and solve the problem end to end. Here, the transfer-entropy is measured with different parameters like node, network and channel for sensor measurements. Then, the obtained values are gathered as training dataset. Subsequently, Artificial Neural Network (ANN) and Deep Neural Network (DNN) are trained with training dataset to detect the existence of the attacks in cyber-physical system. Finally, the average detection accuracy values of ANN and DNN are evaluated through the simulation results as 98.9% and 99.6% respectively.
 Liu Y, Ning P, & Reiter MK (2011), â€œFalse data injection attacks against state estimation in electric power gridsâ€, ACM Transactions on Information and System Security (TISSEC), 14(1), 13. https://doi.org/10.1145/1952982.1952995.
 Mo Y, Chabukswar R, & Sinopoli B (2014), â€œDetecting integrity attacks on SCADA systemsâ€, IEEE Transactions on Control Systems Technology, 22(4), 1396-1407. https://doi.org/10.1109/TCST.2013.2280899.
 Shi D, Guo Z, Johansson KH, & Shi L (2018), â€œCausality countermeasures for anomaly detection in cyber-physical systemsâ€, IEEE Transactions on Automatic Control, 63(2), 386-401. https://doi.org/10.1109/TAC.2017.2714646.
 Mohsenian-Rad AH, & Leon-Garcia A (2011), â€œDistributed internet-based load altering attacks against smart power gridsâ€, IEEE Transactions on Smart Grid, 2(4), 667-674. https://doi.org/10.1109/TSG.2011.2160297.
 Beg OA, Johnson TT, & Davoudi A (2017), â€œDetection of false-data injection attacks in cyber-physical dc microgridsâ€, IEEE Transactions on Industrial Informatics, 13(5), 2693-2703. https://doi.org/10.1109/TII.2017.2656905.
 Pasqualetti F, DÃ¶rfler F, & Bullo F (2013), â€œAttack detection and identification in cyber-physical systemsâ€, IEEE Transactions on Automatic Control, 58(11), 2715-2729. https://doi.org/10.1109/TAC.2013.2266831.
 Fawzi H, Tabuada P, & Diggavi S (2014), â€œSecure estimation and control for cyber-physical systems under adversarial attacksâ€, IEEE Transactions on Automatic Control, 59(6), 1454-1467. https://doi.org/10.1109/TAC.2014.2303233.
 Shi D, Elliott RJ, & Chen T (2017), â€œOn Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systemsâ€, IEEE Trans. Automat. Contr., 62(1), 65-80. https://doi.org/10.1109/TAC.2016.2541919.
 Yu W, & Yang F (2015), â€œDetection of causality between process variables based on industrial alarm data using transfer entropyâ€, Entropy, 17(8), 5868-5887. https://doi.org/10.3390/e17085868.
 Duan P, Yang F, Chen T, & Shah SL (2013), â€œDirect causality detection via the transfer entropy approachâ€, IEEE transactions on control systems technology, 21(6), 2052-2066. https://doi.org/10.1109/TCST.2012.2233476.
 Duan P, Yang F, Shah SL, & Chen T (2015), â€œTransfer zero-entropy and its application for capturing cause and effect relationship between variablesâ€, IEEE Transactions on Control Systems Technology, 23(3), 855-867. https://doi.org/10.1109/TCST.2014.2345095.
 Marques VM, Munaro CJ, & Shah SL (2015), â€œDetection of causal relationships based on residual analysisâ€, IEEE Transactions on Automation Science and Engineering, 12(4), 1525-1534. https://doi.org/10.1109/TASE.2015.2435897.
 Tavallaee M, Bagheri E, Lu W, & Ghorbani, AA (2009), â€œA detailed analysis of the KDD CUP 99 data setâ€, In Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on (pp. 1-6). IEEE. https://doi.org/10.1109/CISDA.2009.5356528.
 KDDâ€™99 Competition Dataset. Available on: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, 1999.