Affiliation:
1. Cardiff University, Cardiff, United Kingdom of Great Britain and Northern Ireland
2. Exalens, London, United Kingdom of Great Britain and Northern Ireland
Abstract
Industrial cyber-physical systems (ICPS) are widely employed in supervising and controlling critical infrastructures, with manufacturing systems that incorporate industrial robotic arms being a prominent example. The increasing adoption of ubiquitous computing technologies in these systems has led to benefits such as real-time monitoring, reduced maintenance costs, and high interconnectivity. This adoption has also brought cybersecurity vulnerabilities exploited by adversaries disrupting manufacturing processes via manipulating actuator behaviors. Previous incidents in the industrial cyber domain prove that adversaries launch sophisticated attacks rendering network-based anomaly detection mechanisms insufficient as the “physics” involved in the process is overlooked. To address this issue, we propose an IoT-based cyber-physical anomaly detection system that can detect motion-based behavioral changes in an industrial robotic arm. We apply both statistical and state-of-the-art machine learning methods to real-time Inertial Measurement Unit data collected from an edge development board attached to an arm doing a pick-and-place operation. To generate anomalies, we modify the joint velocity of the arm. Our goal is to create an air-gapped secondary protection layer to detect “physical” anomalies without depending on the integrity of network data, thus augmenting overall anomaly detection capability. Our empirical results show that the proposed system, which utilizes 1D convolutional neural networks, can successfully detect motion-based anomalies on a real-world industrial robotic arm. The significance of our work lies in its contribution to developing a comprehensive solution for ICPS security, which goes beyond conventional network-based methods.
Funder
EPSRC PETRAS
GCHQ National Resilience Fellowship
Publisher
Association for Computing Machinery (ACM)
Reference141 articles.
1. Adafruit. 2021. Adafruit Feather nRF52840 Sense. Adafruit Industries. Retrieved Nov 12, 2022 from DOI:https://learn.adafruit.com/adafruit-feather-sense
2. Mohiuddin Ahmed and Abdun Naser Mahmood. 2014. Network traffic analysis based on collective anomaly detection. In Proceedings of the 9th IEEE Conference on Industrial Electronics and Applications. IEEE, 1141–1146.
3. Novel approach for network traffic pattern analysis using clustering-based collective anomaly detection;Ahmed Mohiuddin;Ann. Data Sci.,2015
4. Safaa Allamy and Alessandro Lameiras Koerich. 2021. 1D CNN architectures for music genre classification. In Proceedings of the IEEE Symposium Series on Computational Intelligence (SSCI’21). IEEE, 01–07.
5. Identifying and anticipating cyberattacks that could cause physical damage to industrial control systems;Angle Matthew G.;IEEE Power Energy Technol. Syst. J.,2019