Auflistung nach Schlagwort "Cyber Physical System"
1 - 2 von 2
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragIntegrating Dynamic Thresholding in Anomaly Detection on Water Treatment Facilities(INFORMATIK 2024, 2024) Yatagha, Romarick; Oeztuerk, Esin; Nebebe, Betelhem; Edeh, Natasha; Mejri, OumaymaWith the growing complexity of cyber-physical systems (CPS), adaptive and robust monitoring solutions are increasingly crucial for ensuring operational reliability and safety. Anomaly detection is a critical component of monitoring systems, particularly in dynamic environments such as water management systems, where operational regimes can vary significantly over time. Traditional static thresholding techniques, which use a single fixed threshold for the entire monitoring process, are often inadequate due to their inability to adapt to changing data patterns, leading to high rates of false positives and missed detections. This paper explores the limitations of static thresholding and presents a comparative analysis with more adaptive approaches. We first discuss the use of static thresholds for each regime shift, which provides some improvement but still falls short in accommodating gradual or unexpected changes. Subsequently, we introduce a dynamic thresholding method based on the Autoregressive Integrated Moving Average (ARIMA) model. This approach continuously adjusts thresholds in real time, effectively accounting for evolving data patterns and regime shifts. Our evaluation, conducted on synthetic water level data with known anomalies, demonstrates that dynamic thresholding significantly outperforms static methods. Specifically, dynamic thresholding achieves an accuracy of 99%, precision of 78%, recall of 88%, and an F1-score of 82%, highlighting its robustness and adaptability. These results underscore the potential of dynamic thresholding techniques to enhance anomaly detection in complex, variable environments.
- TextdokumentInteractive graphical modeling of security artefacts for abstracted Industry 4.0 automation systems(INFORMATIK 2022, 2022) Tchuegoue Djeukoua,Louis Roger; Kreho,Edin; Belaidi,Siwar; Waedt,KarlThe frontend and backend are found in all software and therefore also on all websites. These two terms describe two different layers that make up programs or pages. About two thirds of all companies have their own website, and most employees use computers.Globally, cyberattacks are becoming more prominent and spreading to multiple areas, and the move to Industry 4.0 requires increased security measures. Important security precautions must be taken from the development of industrial devices that use the Industrial Internet of Things, with IEC 62443, ISO/IEC 27001, and their integration into the architecture of existing information and automation systems must be secure. IEC 62443 focuses on the IT security of so-called industrial automation and control systems (IACS), which are necessary for the safe and reliable operation of automated factories or infrastructures. ] Since security breaches are inevitable, it is also important to implement detection and response mechanisms in industrial automation and control systems (IACS). Together, these measures will enable various organizations to achieve an appropriate level of resilience. This paper discusses the interactive graphical representation of large-scale industrial automation systems for the purpose of modeling and evaluating cybersecurity during all phases of the industrial equipment life cycle. In addition, it addresses the expressiveness and scalability of front-end graphical problems by assuming that a multi-user back-end server with a semi-formal representation of cybersecurity-related artifacts is available, at least in software prototype form.