Skip to main content
Erschienen in: Journal of Intelligent Manufacturing 3/2019

23.02.2017

Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods

verfasst von: Mingtao Wu, Zhengyi Song, Young B. Moon

Erschienen in: Journal of Intelligent Manufacturing | Ausgabe 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

CyberManufacturing system (CMS) is a vision for future manufacturing systems. The concept delineates a vision of advanced manufacturing system integrated with technologies such as Internet of Things, Cloud Computing, Sensors Network and Machine Learning. As a result, cyber-attacks such as Stuxnet attack will increase along with growing simultaneous connectivity. Now, cyber-physical attacks are new and unique risks to CMSs and modern cyber security countermeasure is not enough. To learn this new vulnerability, the cyber-physical attacks is defined via a taxonomy under the vision of CMS. Machine learning on physical data is studied for detecting cyber-physical attacks. Two examples were developed with simulation and experiments: 3D printing malicious attack and CNC milling machine malicious attack. By implementing machine learning methods in physical data, the anomaly detection algorithm reached 96.1% accuracy in detecting cyber-physical attacks in 3D printing process; random forest algorithm reached on average 91.1% accuracy in detecting cyber-physical attacks in CNC milling process.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Bosch, A., Zisserman, A., & Munoz, X. (2007). Image classification using random forests and ferns. In 2007 IEEE 11th international conference on computer vision, pp. 1–8. Bosch, A., Zisserman, A., & Munoz, X. (2007). Image classification using random forests and ferns. In 2007 IEEE 11th international conference on computer vision, pp. 1–8.
Zurück zum Zitat Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection. ACM Computing Surveys, 41(3), 1–58.CrossRef Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection. ACM Computing Surveys, 41(3), 1–58.CrossRef
Zurück zum Zitat Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computig Surveys, 41(3), 1–58.CrossRef Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computig Surveys, 41(3), 1–58.CrossRef
Zurück zum Zitat Duro, J. A., Padget, J. A., Bowen, C. R., & Kim, H. A. (2016). Multi-sensor data fusion framework for Cnc machining monitoring. Mechanical Systems and Signal Processing, 67, 505–520.CrossRef Duro, J. A., Padget, J. A., Bowen, C. R., & Kim, H. A. (2016). Multi-sensor data fusion framework for Cnc machining monitoring. Mechanical Systems and Signal Processing, 67, 505–520.CrossRef
Zurück zum Zitat Garcia, R. F., Rolle, J. L. C., & Castelo, J. P. (2011). A review of SCADA anomaly detection systems. Advances in Intelligent and Soft Computing, 87, 405–414.CrossRef Garcia, R. F., Rolle, J. L. C., & Castelo, J. P. (2011). A review of SCADA anomaly detection systems. Advances in Intelligent and Soft Computing, 87, 405–414.CrossRef
Zurück zum Zitat IBM (2016). Reviewing a year of serious data breaches, major attacks and new vulnerabilities. IBM (2016). Reviewing a year of serious data breaches, major attacks and new vulnerabilities.
Zurück zum Zitat Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4–20. Jain, A. K., Ross, A., & Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4–20.
Zurück zum Zitat Jazdi, N. (2014). Cyber physical systems in the context of industry 4.0. In Automation, quality and testing, robotics. 2014 IEEE , pp. 2–4. Jazdi, N. (2014). Cyber physical systems in the context of industry 4.0. In Automation, quality and testing, robotics. 2014 IEEE , pp. 2–4.
Zurück zum Zitat Jia, H., Murphey, Y. L., Shi, J., & Chang, T. S. (2004). An intelligent real-time vision system for surface defect detection. Proceedings—International Conference on Pattern Recognition, 3(February), 239–242. Jia, H., Murphey, Y. L., Shi, J., & Chang, T. S. (2004). An intelligent real-time vision system for surface defect detection. Proceedings—International Conference on Pattern Recognition, 3(February), 239–242.
Zurück zum Zitat Karthikeyan, K. R., & Indra, A. (2010). Intrusion detection tools and techniques–A survey. International Journal of Computer Theory and Engineering, 2(6), 901–906. Karthikeyan, K. R., & Indra, A. (2010). Intrusion detection tools and techniques–A survey. International Journal of Computer Theory and Engineering, 2(6), 901–906.
Zurück zum Zitat Kim, A. C., Park, W. H., & Lee, D. H. (2013). A study on the live forensic techniques for anomaly detection in user terminals. International Journal of Security and Its Applications, 7(1), 181–187. Kim, A. C., Park, W. H., & Lee, D. H. (2013). A study on the live forensic techniques for anomaly detection in user terminals. International Journal of Security and Its Applications, 7(1), 181–187.
Zurück zum Zitat Prashanth, G., Prashanth, V., Jayashree, P., & Srinivasan, N. (2008). Using random forests for network-based anomaly detection at active routers. In 2008 International conference on signal processing communications. Networking, 2008, pp. 93–96 Prashanth, G., Prashanth, V., Jayashree, P., & Srinivasan, N. (2008). Using random forests for network-based anomaly detection at active routers. In 2008 International conference on signal processing communications. Networking, 2008, pp. 93–96
Zurück zum Zitat Rabatel, J., Bringay, S., & Poncelet, P. (2011). Anomaly detection in monitoring sensor data for preventive maintenance. Expert Systems with Applications., 38, 7003–7015.CrossRef Rabatel, J., Bringay, S., & Poncelet, P. (2011). Anomaly detection in monitoring sensor data for preventive maintenance. Expert Systems with Applications., 38, 7003–7015.CrossRef
Zurück zum Zitat Ren, L., Zhang, L., Tao, F., Zhao, C., Chai, X., & Zhao, X. (2015). Cloud manufacturing: From concept to practice. Enterprise Information Systems, 9(2), 186–209. Ren, L., Zhang, L., Tao, F., Zhao, C., Chai, X., & Zhao, X. (2015). Cloud manufacturing: From concept to practice. Enterprise Information Systems, 9(2), 186–209.
Zurück zum Zitat Shen, Q., Gao, J., & Li, C. (2010). Automatic classification of weld defects in radiographic images. Insight Non-Destructive Testing Condition Monitoring, 52(3), 134–139.CrossRef Shen, Q., Gao, J., & Li, C. (2010). Automatic classification of weld defects in radiographic images. Insight Non-Destructive Testing Condition Monitoring, 52(3), 134–139.CrossRef
Zurück zum Zitat Song, Z., & Moon, Y. B. (2016). Performance analysis of CyberManufacturing systems?: A simulation study. In 13th IFIP international conference on product lifecycle management. Song, Z., & Moon, Y. B. (2016). Performance analysis of CyberManufacturing systems?: A simulation study. In 13th IFIP international conference on product lifecycle management.
Zurück zum Zitat Song, Z., Zhou, H., Cheung, J., & Lin, L. L. (2017). Detecting attacks in CyberManufacturing systems?: Subtractive manufacturing example. In International conference on manufacturing technologies, pp. 1–4. Song, Z., Zhou, H., Cheung, J., & Lin, L. L. (2017). Detecting attacks in CyberManufacturing systems?: Subtractive manufacturing example. In International conference on manufacturing technologies, pp. 1–4.
Zurück zum Zitat Sturm, L. D., Williams, C. B., Camelio, J. A., White, J., & Parker, R. (2014). Cyber-physical Vunerabilities In Additive manufacturing systems, in international solid freeform fabrication symposium proceedings, pp. 951–963. Sturm, L. D., Williams, C. B., Camelio, J. A., White, J., & Parker, R. (2014). Cyber-physical Vunerabilities In Additive manufacturing systems, in international solid freeform fabrication symposium proceedings, pp. 951–963.
Zurück zum Zitat Turner, H., White, J., Camelio, J. A., Williams, C., Amos, B., & Parker, R. (2015). Bad parts: Are our manufacturing systems at risk of silent cyberattacks? IEEE Security & Privacy, 13(3), 40–47.CrossRef Turner, H., White, J., Camelio, J. A., Williams, C., Amos, B., & Parker, R. (2015). Bad parts: Are our manufacturing systems at risk of silent cyberattacks? IEEE Security & Privacy, 13(3), 40–47.CrossRef
Zurück zum Zitat Vincent, H., Wells, L., Tarazaga, P., & Camelio, J. (2015). Trojan detection and side-channel analyses for cyber-security in cyber-physical manufacturing systems. Procedia Manufacturing, 1, 77–85.CrossRef Vincent, H., Wells, L., Tarazaga, P., & Camelio, J. (2015). Trojan detection and side-channel analyses for cyber-security in cyber-physical manufacturing systems. Procedia Manufacturing, 1, 77–85.CrossRef
Zurück zum Zitat Wells, L. J., Camelio, J. A., Williams, C. B., & White J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, 2(2), 74–77. Wells, L. J., Camelio, J. A., Williams, C. B., & White J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, 2(2), 74–77.
Zurück zum Zitat Wu, M., Phoha, V. V., Moon, Y. B., & Belman, A. K.(2016). Detecting malicious defects in 3d printing process using machine learning and image classification. In Proceedings of the ASME 2016 international mechanical engineering congress and exposition, pp. 4–9. Wu, M., Phoha, V. V., Moon, Y. B., & Belman, A. K.(2016). Detecting malicious defects in 3d printing process using machine learning and image classification. In Proceedings of the ASME 2016 international mechanical engineering congress and exposition, pp. 4–9.
Zurück zum Zitat Wu, M., Zhou, H., Lin, L. L., Silva, B., Song, Z., Cheung, J., & Moon, Y. (2016). Detecting attacks in CyberManufacturing systems?: Additive manufacturing example. In International conference on mechanical, materials and manufacturing, pp. 1–5. Wu, M., Zhou, H., Lin, L. L., Silva, B., Song, Z., Cheung, J., & Moon, Y. (2016). Detecting attacks in CyberManufacturing systems?: Additive manufacturing example. In International conference on mechanical, materials and manufacturing, pp. 1–5.
Zurück zum Zitat Yampolskiy, M., Horvath, P., Koutsoukos, X. D., Xue, Y., & Sztipanovits, J. (2013). Taxonomy for description of cross-domain attacks on CPS. In Proceedings of the 2nd ACM international conference on high confidence networked systems, pp. 135–142. Yampolskiy, M., Horvath, P., Koutsoukos, X. D., Xue, Y., & Sztipanovits, J. (2013). Taxonomy for description of cross-domain attacks on CPS. In Proceedings of the 2nd ACM international conference on high confidence networked systems, pp. 135–142.
Zurück zum Zitat Zeltmann, S. E., Gupta, N., Tsoutsos, N. G., Maniatakos, M., Rajendran, J., & Karri, R. (2016). Manufacturing and security challenges in 3D printing. Jom, 68(7), 1872–1881.CrossRef Zeltmann, S. E., Gupta, N., Tsoutsos, N. G., Maniatakos, M., Rajendran, J., & Karri, R. (2016). Manufacturing and security challenges in 3D printing. Jom, 68(7), 1872–1881.CrossRef
Zurück zum Zitat Zhang, X. W., Ding, Y. Q., Lv, Y. Y., Shi, A. Y., & Liang, R. Y. (2011). A vision inspection system for the surface defects of strongly reflected metal based on multi-class SVM. Expert Systems with Applications, 38(5), 5930–5939. Zhang, X. W., Ding, Y. Q., Lv, Y. Y., Shi, A. Y., & Liang, R. Y. (2011). A vision inspection system for the surface defects of strongly reflected metal based on multi-class SVM. Expert Systems with Applications, 38(5), 5930–5939.
Zurück zum Zitat Zhu, T., Ma, Q., Zhang, S., & Liu, Y. (2014). Context-free attacks using keyboard acoustic emanations. In Proceedings of 2014 ACM SIGSAC conference on computer and communication security— CCS ’14, 3(1), 453–464. Zhu, T., Ma, Q., Zhang, S., & Liu, Y. (2014). Context-free attacks using keyboard acoustic emanations. In Proceedings of 2014 ACM SIGSAC conference on computer and communication security— CCS ’14, 3(1), 453–464.
Metadaten
Titel
Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods
verfasst von
Mingtao Wu
Zhengyi Song
Young B. Moon
Publikationsdatum
23.02.2017
Verlag
Springer US
Erschienen in
Journal of Intelligent Manufacturing / Ausgabe 3/2019
Print ISSN: 0956-5515
Elektronische ISSN: 1572-8145
DOI
https://doi.org/10.1007/s10845-017-1315-5

Weitere Artikel der Ausgabe 3/2019

Journal of Intelligent Manufacturing 3/2019 Zur Ausgabe

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.