Abstract
In the era of Industry 4.0, smart devices in the manufacturing industry have become increasingly used and interconnected. However, this also increases the possibility of anomaly and cyber-attacks in the heterogeneous smart systems, resulting in failure which may have a cascading effect on different machines in the factory. Physical damage or business interruption can be caused by cyber-attacks in the manufacturing industry. Machine learning (ML) is an important enabling technology in Industry 4.0 and it can be a solution to the problem aforementioned. But there is a lack of publicly available datasets that include network and Operation technologies (OT) data containing different types of cyber-attacks in the context of Industry 4.0 manufacturing systems. Moreover, many researchers do not release the dataset they utilise which makes it difficult to benchmark or compare the work of different researchers. This paper presents a dataset which is acquired from a contemporary and realistic Industry 4.0 manufacturing system. The dataset comprises of seven different scenarios including normal operation, a range of cyber-attacks and anomalies caused by disgruntled employees as well as errors in manufacturing operations. Using the dataset, we train three machine learning models to detect attacks and anomalies, before presenting the results. We conclude that ML classifiers trained by our dataset perform well in detecting most of the attack types and anomalies. Physical and network data can be a good combination to build a robust system for detecting attacks and anomalies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Market and markets. https://www.marketsandmarkets.com/Market-Reports/industry-4-market-102536746.html. Accessed 4 Sep 2022
Deloitte. https://www2.deloitte.com/global/en/pages/real-estate/articles/future-real-estate-data-new-gold.html. Accessed 4 Sep 2022
Faramondi, L., Flammini, F., Guarino, S., Setola, R.: A hardware-in-the-loop water distribution testbed dataset for cyber-physical security testing. IEEE Access 9, 122385–122396 (2021). https://doi.org/10.1109/ACCESS.2021.3109465
Goh, J., Adepu, S., Junejo, K., Mathur, A.: A Dataset to Support Research in the Design of Secure Water Treatment Systems (2016)
Laso, P., Brosset, D., Puentes, J.: Dataset of Anomalies and Malicious Acts in a Cyber-Physical Subsystem. Data in Brief, 14 (2017). https://doi.org/10.1016/j.dib.2017.07.038.
Biswas, P.P., Tan, H.C., Zhu, Q., Li, Y., Mashima, D., Chen, B.: A synthesized dataset for cybersecurity study of IEC 61850 based substation. In: 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 1–7 (2019). https://doi.org/10.1109/SmartGridComm.2019.8909783
Ahmed, C., Kandasamy, N.K.: A Comprehensive Dataset from a Smart Grid Testbed for Machine Learning Based CPS Security Research (2021). https://doi.org/10.1007/978-3-030-69781-5_9
Shi, L., Chen, X., Wen, S., Xiang, Y.: Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats (2020). https://doi.org/10.1007/978-3-030-37352-8_53
CTU-13 Dataset. https://www.stratosphereips.org/datasets-ctu13. Accessed 31 May 2022
Cheng, L., Donghong, L., Liang, M.: The spear to break the security wall of S7CommPlus (2017). https://media.defcon.org/DEFCON25/DEFCON25 presentations/Cheng Lei/DEFCON-25-Cheng-Lei-The-Spear-to-Break-the-SecurityWall-of-S7CommPlus-WP.pdf. Accessed 10 Sep 2022
MiroTic Homepage. https://mikrotik.com/. Accessed 10 Sep 2022
The Real Story of Stuxnet. https://spectrum.ieee.org/the-real-story-of-stuxnet. Accessed 10 Sep 2022
Tia Portal: https://new.siemens.com/global/en/products/automation/industry-software/automation-software/tia-portal.html. Accessed 10 Sep 2022
Kumar, M.: Irongate - New Stuxnet-like Malware Targets Industrial Control Systems (2016). https://thehackernews.com/2016/06/irongate-stuxnet-malware.html. Accessed 10 Sep 2022
KishorWagh, S., Pachghare, V., Kolhe, S.: Survey on intrusion detection system using machine learning techniques. Int. J. Comput. App. 78, 30–37 (2013). https://doi.org/10.5120/13608-1412
KDD Cup 99 Dataset. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed 10 Sep 2022
Scapy homepage. https://scapy.net/. Accessed 10 Sep 2022
Ettercap Scapy homepage. https://www.ettercap-project.org/. Accessed 10 Sep 2022
Ettercap Scapy homepage. https://scikit-learn.org/stable/. Accessed 10 Sep 2022
Carlsson, T.: Industrial networks keep growing despite challenging times (2022). https://www.hms-networks.com/news-and-insights/news-from-hms/2022/05/02/industrial-networks-keep-growing-despite-challenging-times. Accessed 10 Sep 2022
Dias, A.L., Sestito, G.S., Turcato, A.C., Brandão, D.: Panorama, challenges and opportunities in PROFINET protocol research. In: 2018 13th IEEE International Conference on Industry Applications (INDUSCON, pp. 186–193 (2018). https://doi.org/10.1109/INDUSCON.2018.8627173
Siemens: Recording and monitoring process data (2020). https://support.industry.siemens.com/cs/attachments/64396156/64396156_S7-1x00_DataLogging_DOC_V4.0_en.pdf. Accessed 10 Sep 2022
Gomez, A.L., et al.: On the generation of anomaly detection datasets in industrial control systems. IEEE Access 7, 177460–177473 (2019). https://doi.org/10.1109/ACCESS.2019.2958284
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Shi, L., Krishnan, S., Wen, S., Xiang, Y. (2022). Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset. In: Yuan, X., Bai, G., Alcaraz, C., Majumdar, S. (eds) Network and System Security. NSS 2022. Lecture Notes in Computer Science, vol 13787. Springer, Cham. https://doi.org/10.1007/978-3-031-23020-2_19
Download citation
DOI: https://doi.org/10.1007/978-3-031-23020-2_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-23019-6
Online ISBN: 978-3-031-23020-2
eBook Packages: Computer ScienceComputer Science (R0)