TY - GEN
T1 - Stealthy Cyber Anomaly Detection On Large Noisy Multi-material 3D Printer Datasets Using Probabilistic Models
AU - Yoginath, Srikanth
AU - Iannacone, Michael
AU - Tansakul, Varisara
AU - Passian, Ali
AU - Jordan, Rob
AU - Asiamah, Joel
AU - Nance Ericson, M.
AU - Long, Gavin
AU - Dawson, Joel A.
N1 - Publisher Copyright:
© 2022 ACM.
PY - 2022/11/11
Y1 - 2022/11/11
N2 - As Additive Layer Manufacturing (ALM) becomes pervasive in industry, its applications in safety critical component manufacturing are being explored and adopted. However, ALM's reliance on embedded computing renders it vulnerable to tampering through cyber-attacks. Sensor instrumentation of ALM devices allows for rigorous process and security monitoring, but also results in a massive volume of noisy data for each run. As such, in-situ, near-real-time anomaly detection is very challenging. The ideal algorithm for this context is simple, computationally efficient, minimizes false positives, and is accurate enough to resolve small deviations. In this paper, we present a probabilistic-model-based approach to address this challenge. To test our approach, we analyze current measurements from a polymer composite 3D printer during emulated tampering attacks. Our results show that our approach can consistently and efficiently locate small changes in the presence of substantial operational noise.
AB - As Additive Layer Manufacturing (ALM) becomes pervasive in industry, its applications in safety critical component manufacturing are being explored and adopted. However, ALM's reliance on embedded computing renders it vulnerable to tampering through cyber-attacks. Sensor instrumentation of ALM devices allows for rigorous process and security monitoring, but also results in a massive volume of noisy data for each run. As such, in-situ, near-real-time anomaly detection is very challenging. The ideal algorithm for this context is simple, computationally efficient, minimizes false positives, and is accurate enough to resolve small deviations. In this paper, we present a probabilistic-model-based approach to address this challenge. To test our approach, we analyze current measurements from a polymer composite 3D printer during emulated tampering attacks. Our results show that our approach can consistently and efficiently locate small changes in the presence of substantial operational noise.
KW - additive layer manufacturing
KW - anomaly detection
KW - bayesian inference
KW - cyber-physical system security
KW - markov chain monte carlo
UR - http://www.scopus.com/inward/record.url?scp=85145572696&partnerID=8YFLogxK
U2 - 10.1145/3560833.3563564
DO - 10.1145/3560833.3563564
M3 - Conference contribution
AN - SCOPUS:85145572696
T3 - AMSec 2022 - Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing ,3D Printing Security, co-located with CCS 2022
SP - 25
EP - 38
BT - AMSec 2022 - Proceedings of the 2022 ACM CCS Workshop on Additive Manufacturing ,3D Printing Security, co-located with CCS 2022
PB - Association for Computing Machinery, Inc
T2 - 2022 ACM CCS Workshop on Additive Manufacturing ,3D Printing Security, AMSec 2022 - Co-located with CCS 2022
Y2 - 11 November 2022
ER -