Comparative analysis of dimensionality reduction techniques for cybersecurity in the SWaT dataset

Mehmet Bozdal, Kadir Ileri*, Ali Ozkahraman

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)

Abstract

Abstract: The Internet of Things (IoT) has revolutionized the functionality and efficiency of distributed cyber-physical systems, such as city-wide water treatment systems. However, the increased connectivity also exposes these systems to cybersecurity threats. This research presents a novel approach for securing the Secure Water Treatment (SWaT) dataset using a 1D Convolutional Neural Network (CNN) model enhanced with a Gated Recurrent Unit (GRU). The proposed method outperforms existing methods by achieving 99.68% accuracy and an F1 score of 98.69%. Additionally, the paper explores dimensionality reduction methods, including Autoencoders, Generalized Eigenvalue Decomposition (GED), and Principal Component Analysis (PCA). The research findings highlight the importance of balancing dimensionality reduction with the need for accurate intrusion detection. It is found that PCA provided better performance compared to the other techniques, as reducing the input dimension by 90.2% resulted in only a 2.8% and 2.6% decrease in the accuracy and F1 score, respectively. This study contributes to the field by addressing the critical need for robust cybersecurity measures in IoT-enabled water treatment systems, while also considering the practical trade-off between dimensionality reduction and intrusion detection accuracy.

Original languageEnglish
Pages (from-to)1059-1079
Number of pages21
JournalJournal of Supercomputing
Volume80
Issue number1
DOIs
Publication statusPublished - Jan 2024

Bibliographical note

Publisher Copyright:
© 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.

Keywords

  • Convolutional neural networks
  • Dimensionality reduction
  • Gated recurrent unit
  • Intrusion detection
  • Secure water treatment dataset

Fingerprint

Dive into the research topics of 'Comparative analysis of dimensionality reduction techniques for cybersecurity in the SWaT dataset'. Together they form a unique fingerprint.

Cite this