generalization to unseen anomaly patterns and using
supervised methods to learn a suitable threshold strat-
egy. For the latter, as the nature of the data pro-
duced by the CPSs continuously changes and insuf-
ficient labeled data for each class are available, more
than supervised methods are needed. In aCVAE, the
stochastic latent variable is learned from spatial and
temporal dependencies of the correlation matrices,
making the reconstruction more generalized. A ro-
bust objective function is integrated into the mod-
els to avoid the contamination problem of the la-
tent space. Finally, an unsupervised dynamic-based
threshold-setting strategy is adopted, instead of the
traditional supervised ROC-based strategy, to achieve
better model performance. The reported experimental
results demonstrate that aCVAE can outperform state-
of-the-art baseline methods.
6 CONCLUSIONS
This work addressed the importance of detecting
anomalies in industrial control systems and proposed
a new deep generative model, aCVAE, to meet this
need. The model uses a variational autoencoder with
a 3D convolutional encoder and decoder and an at-
tention mechanism that enhances feature representa-
tion and anomaly detection accuracy. The (binary)
classification performance is improved using a recon-
struction probability error and a dynamic threshold
approach. The experiments conducted on the SWaT
testbed demonstrate that our approach outperforms
state-of-the-art baselines, making it a promising so-
lution for industrial settings.
Although the proposed model shows promising
results, there are still areas for improvement in fu-
ture work: (i) Incorporating self-attention mecha-
nisms (Niu et al., 2021) could help the model cap-
ture long-range dependencies and improve anomaly
detection accuracy; (ii) Using more lightweight mod-
els, such as SqueezeNet (Iandola et al., 2016), or em-
ploying other techniques to compress deep neural net-
works (Cheng et al., 2018) could facilitate deploy-
ment over resource-constrained devices; (iii) Investi-
gating better windowing strategies could improve the
model’s representation of temporal dependencies and
its ability to detect anomalies across different time
scales. These directions offer opportunities for further
developments in the field, ultimately leading to more
effective and efficient anomaly detection in industrial
control systems.
REFERENCES
Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z.,
Citro, C., Corrado, G. S., Davis, A., Dean, J., Devin,
M., et al. (2016). Tensorflow: Large-scale machine
learning on heterogeneous distributed systems. arXiv
preprint arXiv:1603.04467.
Almalawi, A., Fahad, A., Tari, Z., Alamri, A., AlGhamdi,
R., and Zomaya, A. Y. (2016). An efficient data-driven
clustering technique to detect attacks in SCADA sys-
tems. IEEE Trans.Inform.Forensic Secur., 11(5):893–
906.
Almalawi, A., Yu, X., Tari, Z., Fahad, A., and Khalil, I.
(2014). An unsupervised anomaly-based detection ap-
proach for integrity attacks on SCADA systems. Com-
puters & Security, 46:94–110.
Brown, C. D. and Davis, H. T. (2006). Receiver operating
characteristics curves and related decision measures:
A tutorial. Chemometr. Intell. Lab., 80(1):24–38.
Chen, T., Liu, X., Xia, B., Wang, W., and Lai, Y. (2020).
Unsupervised anomaly detection of industrial robots
using sliding-window convolutional variational au-
toencoder. IEEE Access, 8:47072–47081.
Cheng, Y., Wang, D., Zhou, P., and Zhang, T. (2018). Model
Compression and Acceleration for Deep Neural Net-
works: The Principles, Progress, and Challenges.
IEEE Signal Processing Magazine, 35(1):126–136.
Cheng, Z., Zou, C., and Dong, J. (2019). Outlier detection
using isolation forest and local outlier factor. In Pro-
ceedings of the Conference on Research in Adaptive
and Convergent Systems. ACM.
Chollet, F. et al. (2015). Keras. https://keras.io.
Dey, R. and Salem, F. M. (2017). Gate-variants of gated re-
current unit (GRU) neural networks. In 2017 IEEE
60th International Midwest Symposium on Circuits
and Systems (MWSCAS). IEEE.
Duo, W., Zhou, M., and Abusorrah, A. (2022). A survey
of cyber attacks on cyber physical systems: Recent
advances and challenges. IEEE/CAA Journal of Auto-
matica Sinica, 9(5):784–800.
Goh, J., Adepu, S., Junejo, K. N., and Mathur, A. (2017a).
A dataset to support research in the design of secure
water treatment systems. In Havarneanu, G., Setola,
R., Nassopoulos, H., and Wolthusen, S., editors, Criti-
cal Information Infrastructures Security, pages 88–99,
Cham. Springer International Publishing.
Goh, J., Adepu, S., Tan, M., and Lee, Z. S. (2017b).
Anomaly detection in cyber physical systems using
recurrent neural networks. In 2017 IEEE 18th Inter-
national Symposium on High Assurance Systems En-
gineering (HASE), pages 140–145. IEEE, IEEE.
Goodfellow, I., Bengio, Y., and Courville, A. (2016). Deep
learning. MIT press.
Guo, S., Lin, Y., Li, S., Chen, Z., and Wan, H. (2019). Deep
spatial–temporal 3d convolutional neural networks for
traffic data forecasting. IEEE Transactions on Intelli-
gent Transportation Systems, 20(10):3913–3926.
Huang, G., Gong, Y., Xu, Q., Wattanachote, K., Zeng, K.,
and Luo, X. (2020). A convolutional attention residual
DMMLACS 2023 - 3rd International Special Session on Data Mining and Machine Learning Applications for Cyber Security
576