Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods

CyberManufacturing system (CMS) is a vision for future manufacturing systems. The concept delineates a vision of advanced manufacturing system integrated with technologies such as Internet of Things, Cloud Computing, Sensors Network and Machine Learning. As a result, cyber-attacks such as Stuxnet attack will increase along with growing simultaneous connectivity. Now, cyber-physical attacks are new and unique risks to CMSs and modern cyber security countermeasure is not enough. To learn this new vulnerability, the cyber-physical attacks is defined via a taxonomy under the vision of CMS. Machine learning on physical data is studied for detecting cyber-physical attacks. Two examples were developed with simulation and experiments: 3D printing malicious attack and CNC milling machine malicious attack. By implementing machine learning methods in physical data, the anomaly detection algorithm reached 96.1% accuracy in detecting cyber-physical attacks in 3D printing process; random forest algorithm reached on average 91.1% accuracy in detecting cyber-physical attacks in CNC milling process.

[1]  R Karthikeyan.K.,et al.  Intrusion Detection Tools and Techniques –A Survey , 2010 .

[2]  Yuan Xue,et al.  Taxonomy for description of cross-domain attacks on CPS , 2013, HiCoNS '13.

[3]  Jules White,et al.  Bad Parts: Are Our Manufacturing Systems at Risk of Silent Cyberattacks? , 2015, IEEE Security & Privacy.

[4]  Young B. Moon,et al.  Performance Analysis of CyberManufacturing Systems: A Simulation Study , 2016, PLM.

[5]  Jules White,et al.  Cyber-physical security challenges in manufacturing systems , 2014 .

[6]  Vir V. Phoha,et al.  Detecting Malicious Defects in 3D Printing Process Using Machine Learning and Image Classification , 2016 .

[7]  José Luís Calvo-Rolle,et al.  Thermal Efficiency Supervision by NN Based Functional Approximation Techniques , 2011, SOCO.

[8]  Zhang Xuewu,et al.  A vision inspection system for the surface defects of strongly reflected metal based on multi-class SVM , 2011 .

[9]  Roberto Uribeetxeberria,et al.  A Review of SCADA Anomaly Detection Systems , 2011, SOCO.

[10]  Pascal Poncelet,et al.  Anomaly detection in monitoring sensor data for preventive maintenance , 2011, Expert Syst. Appl..

[11]  Felix Naumann,et al.  Data fusion , 2009, CSUR.

[12]  Won Hyung Park,et al.  A study on the live forensic techniques for anomaly detection in user terminals , 2013 .

[13]  Zhengyi Song,et al.  Detecting Attacks in CyberManufacturing Systems: Additive Manufacturing Example , 2017 .

[14]  T.Y. Lin,et al.  Anomaly detection , 1994, Proceedings New Security Paradigms Workshop.

[15]  N. Srinivasan,et al.  Using Random Forests for Network-based Anomaly detection at Active routers , 2008, 2008 International Conference on Signal Processing, Communications and Networking.

[16]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[17]  Nektarios Georgios Tsoutsos,et al.  Manufacturing and Security Challenges in 3D Printing , 2016 .

[18]  Lei Ren,et al.  Cloud manufacturing: from concept to practice , 2015, Enterp. Inf. Syst..

[19]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[20]  Julian Padget,et al.  Multi-sensor data fusion framework for CNC machining monitoring , 2016 .

[21]  Cheng Li,et al.  Automatic classification of weld defects in radiographic images , 2010 .

[22]  Leif E. Peterson K-nearest neighbor , 2009, Scholarpedia.

[23]  N. Jazdi,et al.  Cyber physical systems in the context of Industry 4.0 , 2014, 2014 IEEE International Conference on Automation, Quality and Testing, Robotics.

[24]  Yi Lu Murphey,et al.  An intelligent real-time vision system for surface defect detection , 2004, ICPR 2004.

[25]  Jaime A. Camelio,et al.  Trojan Detection and Side-channel Analyses for Cyber-security in Cyber-physical Manufacturing Systems , 2015 .

[26]  Andrew Zisserman,et al.  Image Classification using Random Forests and Ferns , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[27]  Yunhao Liu,et al.  Context-free Attacks Using Keyboard Acoustic Emanations , 2014, CCS.