Detection of Cyber-Physical Attacks in Additive Manufacturing: An LSTM-Based Autoencoder Method Utilizing Reconstruction Error Analysis from Side-Channel Monitoring
Downloads
To identify cyber-physical threats in additive manufacturing systems, this study proposes an advanced technique utilizing data from side-channel monitoring. The method combines several key approaches for preprocessing, analyzing, and classifying time-series data, ensuring robust attack detection capabilities. A predefined Window Sliding (FWS) preprocessing method segments continuous time-series data into manageable windows of specified size, making analysis more efficient. Next, we employ Discrete Wavelet Transform (DWT) to extract features from each window, capturing essential information across various frequency bands. Particle Swarm Optimization (PSO) is then used to refine the DWT coefficients, isolating the most valuable features to enhance classification performance by focusing on the most informative characteristics. The optimal feature set is used to train a deep learning (DL) model capable of identifying anomalies through reconstruction errors, specifically an LSTM-A autoencoder. Our results demonstrate that this approach can distinguish between normal and attack scenarios with an accuracy rate of 99% when applied to side-channel attack detection in additive manufacturing. This method provides a scalable and adaptable solution to safeguard cyber-physical systems against sophisticated cyberattacks while improving detection accuracy.
Kumar, T. Gopi, N. Harikeerthana, M. K. Gupta, V. Gaur, G. M.Krolczyk, and C. Wu, "Machine learning techniques in additive manufacturing: a state of the art review on design, processes andproduction control," Journal of Intelligent Manufacturing, vol. 34, no.1, pp. 21-55, 2023.
S. Kim and K.-J. Park, "A survey on machine-learning based securitydesign for cyber-physical systems," Applied Sciences, vol. 11, no. 12,p. 5458, 2021.
Vallabhaneni, R., Pillai, S. E. V. S., Vaddadi, S. A., Addula, S. R., & Ananthan, B. (2024). Secured web application based on CapsuleNet and OWASP in the cloud. Indonesian Journal of Electrical Engineering and Computer Science, 35(3), 1924-1932.
Vallabhaneni, R., Nagamani, H. S., Harshitha, P., & Sumanth, S. (2024, March). Team Work Optimizer Based Bidirectional LSTM Model for Designing a Secure Cybersecurity Model. In 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT) (pp. 1-6). IEEE.
S. Liang, S. A. Zonouz, and R. Beyah, "Hiding My Real Self!Protecting Intellectual Property in Additive Manufacturing SystemsAgainst Optical Side-Channel Attacks," in NDSS, 2022.
S.-Y. Yu, A. V. Malawade, S. R. Chhetri, and M. A. Al Faruque,"Sabotage attack detection for additive manufacturing systems," IEEE Access, vol. 8, pp. 27218-27231, 2021.
H. Pearce, K. Yanamandra, N. Gupta, and R. Karri, "Flaw3d: A trojan-based cyber attack on the physical outcomes of additive manufacturing," IEEE/ASME Transactions on Mechatronics, vol. 27,
no. 6, pp. 5361-5370, 2022.
Vallabhaneni, R., Vaddadi, S. A., Pillai, S. E. V. S., Addula, S. R., & Ananthan, B. (2024). MobileNet based secured compliance through open web application security projects in cloud system. Indonesian Journal of Electrical Engineering and Computer Science, 35(3), 1661-1669.
Z. Shi, C. Kan, W. Tian, and C. Liu, "A Blockchain-based G-codeprotection approach for cyber-physical security in additive manufacturing," Journal of Computing and Information Science in Engineering, vol. 21, no. 4, p. 041007, 2021.
M. Ahsan, M. H. Rais, and I. Ahmed, "Sok: Side channel monitoringfor additive manufacturing-bridging cybersecurity and quality assurance communities," in 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), pp. 1160-1178, 2023.
Vallabhaneni, R., Pillai, S. E. V. S., Vaddadi, S. A., Addula, S. R., & Ananthan, B. (2024). Optimized deep neural network based vulnerability detection enabled secured testing for cloud SaaS. Indonesian Journal of Electrical Engineering and Computer Science, 36(3), 1950-1959.