Chapter
May 18, 2017
Detection of Cyber-Attacks to Water Systems through Machine-Learning-Based Anomaly Detection in SCADA Data
Authors: Sarin E. Chandy [email protected], Amin Rasekh, Ph.D. [email protected], Zachary A. Barker [email protected], Bruce Campbell [email protected], and M. Ehsan Shafiee, Ph.D. [email protected]Author Affiliations
Publication: World Environmental and Water Resources Congress 2017
Abstract
Vulnerability of water infrastructure to cyber-attacks is proliferated as the operation of these systems is automated using networked systems. Reports of several cyber-attacks to water systems such as the 2006 Pennsylvania Water Company hack and the 2012 Tijuana River sewage spill has proven the water community concerns for the security of these systems. This study proposes a machine-learning-based anomaly detection methodology for early cyber-attack detection and warning that is tailored to water distributions systems security. Attacks are assumed to be manifested as man-induced anomalies in SCADA time series data that should be detected in a short time with low false negative/positive rates. The methodology is trained by and examined on the BATtle of the Attack Detection ALgorithms (BATADAL) dataset.
Get full access to this article
View all available purchase options and get full access to this chapter.
Information & Authors
Information
Published In
Copyright
© 2017 American Society of Civil Engineers.
History
Published online: May 18, 2017
Permissions
Request permissions for this article.
Authors
Affiliations
Sensus Inc., 8601 Six Forks Rd., Suite 700, Raleigh, NC 27615. E-mail: [email protected]
Sensus Inc., 8601 Six Forks Rd., Suite 700, Raleigh, NC 27615. E-mail: [email protected]
Sensus Inc., 8601 Six Forks Rd., Suite 700, Raleigh, NC 27615. E-mail: [email protected]
Sensus Inc., 8601 Six Forks Rd., Suite 700, Raleigh, NC 27615. E-mail: [email protected]
Sensus Inc., 8601 Six Forks Rd., Suite 700, Raleigh, NC 27615. E-mail: [email protected]
Metrics & Citations
Metrics
Citations
Download citation
If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.
Cited by
View Options
Get Access
Access content
Please select your options to get access
Log in/Register
Log in via your institution (Shibboleth)
ASCE Members:
Please log in to see member pricing
Purchase
Save for later Item saved, go to cart Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.
Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
Get Access
Access content
Please select your options to get access
Log in/Register
Log in via your institution (Shibboleth)
ASCE Members:
Please log in to see member pricing
Purchase
Save for later Item saved, go to cart Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.
Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.