Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3474718.3474719acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsetConference Proceedingsconference-collections
research-article

Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed

Published: 07 September 2021 Publication History

Abstract

Security datasets with various operating characteristics and abnormal situations of industrial control system (ICS) are essential to develop artificial intelligence (AI)-based control system security technology. In this study, we built a hardware-in-the-loop (HIL)-based augmented ICS (HAI) testbed and developed ICS security datasets. Here, we introduce the second dataset (HAI 21.03), which was developed with the user feedback of the first released version (HAI 20.07). All HAI datasets are publicly available at https://github.com/icsdataset/hai. HAI 21.03 was expanded by adding data points and normal/attack scenarios to HAI 20.07. We also held an AI-based anomaly detection contest (HAICon 2020) utilizing the HAI datasets developed so far, giving many AI researchers an opportunity to discuss and share ideas for ICS anomaly detection research. This paper presents the results of the HAICon 2020. The results of the top teams in the competition can be used as a performance comparison criterion when using HAI 21.03.

References

[1]
Won-Seok Hwang, Jeong-Han Yun, Jonguk Kim, and Hyoung Chun Kim. 2019. Time-Series Aware Precision and Recall for Anomaly Detection: Considering Variety of Detection Result and Addressing Ambiguous Labeling. In Proceedings of the 28th ACM International Conference on Information and Knowledge Management. ACM, 2241–2244.
[2]
Siddhartha Kumar Khaitan and James D McCalley. 2014. Design techniques and applications of cyberphysical systems: A survey. In IEEE Systems Journal.
[3]
Hyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, and HyoungChun Kim. 2019. Implementation of Programmable CPS Testbed for Anomaly Detection. In 12th USENIX Workshop on Cyber Security Experimentation and Test(CSET 19).
[4]
H.-K. Shin, W. Lee, J.-H. Yun, and H. C. Kim. 2020. HAI 1.0: HIL-based Augmented ICS Security Dataset. In 13th USENIX Workshop on Cyber Security Experimentation and Test(CSET 20).

Cited By

View all
  • (2025)Prospective Multi-Graph Cohesion for Multivariate Time Series Anomaly DetectionProceedings of the Eighteenth ACM International Conference on Web Search and Data Mining10.1145/3701551.3703494(98-106)Online publication date: 10-Mar-2025
  • (2024)A Security Posture Assessment of Industrial Control Systems Based on Evidential Reasoning and Belief Rule BaseSensors10.3390/s2422713524:22(7135)Online publication date: 6-Nov-2024
  • (2024)GOOSE Secure: A Comprehensive Dataset for In-Depth Analysis of GOOSE Spoofing Attacks in Digital SubstationsEnergies10.3390/en1723609817:23(6098)Online publication date: 4-Dec-2024
  • Show More Cited By

Index Terms

  1. Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        CSET '21: Proceedings of the 14th Cyber Security Experimentation and Test Workshop
        August 2021
        95 pages
        ISBN:9781450390651
        DOI:10.1145/3474718
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 07 September 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. anomaly detection
        2. artificial intelligence
        3. hardware-in-the-loop
        4. industrial control system
        5. security dataset
        6. testbed

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        CSET '21

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)116
        • Downloads (Last 6 weeks)15
        Reflects downloads up to 03 Mar 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2025)Prospective Multi-Graph Cohesion for Multivariate Time Series Anomaly DetectionProceedings of the Eighteenth ACM International Conference on Web Search and Data Mining10.1145/3701551.3703494(98-106)Online publication date: 10-Mar-2025
        • (2024)A Security Posture Assessment of Industrial Control Systems Based on Evidential Reasoning and Belief Rule BaseSensors10.3390/s2422713524:22(7135)Online publication date: 6-Nov-2024
        • (2024)GOOSE Secure: A Comprehensive Dataset for In-Depth Analysis of GOOSE Spoofing Attacks in Digital SubstationsEnergies10.3390/en1723609817:23(6098)Online publication date: 4-Dec-2024
        • (2024)Improving Deceptive Patch Solutions Using Novel Deep Learning-Based Time Analysis Model for Industrial Control SystemsApplied Sciences10.3390/app1420928714:20(9287)Online publication date: 12-Oct-2024
        • (2024)Data Reconstruction via Consensus Graph Learning for Effective Anomaly Detection in Industrial IoTIEEE Transactions on Industrial Informatics10.1109/TII.2023.331622020:3(3996-4006)Online publication date: Mar-2024
        • (2024)Real-Time Intrusion Detection Based on Decision Fusion in Industrial Control SystemsIEEE Transactions on Industrial Cyber-Physical Systems10.1109/TICPS.2024.34065052(143-153)Online publication date: 2024
        • (2024)AgileAD: Anchor-Guided Contrastive Learning with a General Data Augmentation Strategy for Time Series Anomaly Detection2024 IEEE 36th International Conference on Tools with Artificial Intelligence (ICTAI)10.1109/ICTAI62512.2024.00086(573-577)Online publication date: 28-Oct-2024
        • (2024)Real-Time Simulation and Workforce Development with TROY: Testbed for Resilient Operational Systems2024 IEEE Design Methodologies Conference (DMC)10.1109/DMC62632.2024.10812136(1-7)Online publication date: 18-Nov-2024
        • (2024)Deep learning and ensemble methods for anomaly detection in ICS securityInternational Journal of Information Technology10.1007/s41870-024-02299-717:3(1761-1775)Online publication date: 3-Dec-2024
        • (2024)Enhancing multivariate time-series anomaly detection with positional encoding mechanisms in transformersThe Journal of Supercomputing10.1007/s11227-024-06694-681:1Online publication date: 11-Dec-2024
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media