Abstract
Industrial Control System is used in the industrial process for reducing the human factor burden and handling the complex industrial system process and communications between them efficiently. Internet of Things (IoT) is the fusion of devices and sensors by an information network to enable new and autonomous capabilities. The integration of IoT with industrial applications known as the Industrial Internet of Things (IIoT). The IIoT is found in several critical infrastructures such as water distribution networks. Nowadays, ICS is vulnerable to using the Internet connection to enable industrial IoT sensors to communicate with each other in Real-Time. Therefore, this paper presents an analytical study of detecting anomalies, malicious activities, and cyber-attacks in a cyber-physical of critical water infrastructure in the IIoT infrastructure. The study uses various machine learning algorithms to classify the anomaly events including several attacks and IIoT hardware failures. A real-world dataset covering 15 anomaly situations of normal system activity was analyzed for the research review of the proposed approach. The test situations involved a wide array of incidents from hardware breakdown to water SCADA device sabotage. To classify the malicious activity, various machine learning methods, such as Logistic Regression (LR), Linear Discriminant Analysis (LDA), k-nearest neighbours (KNN), Naive Bayes (NB), Support Vector Machine (SVM), and Classification and Regression Tree (CART) are used. The results show that CART and NB have the best results for accuracy, precision, recall, and F1-score.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.