A Giant-Step Baby-Step Classifier For Scalable and Real-Time Anomaly Detection In Industrial Control Systems and Water Treatment Systems
Pith reviewed 2026-05-22 18:35 UTC · model grok-4.3
The pith
Linearizing sensor-actuator relationships enables millisecond anomaly detection with full traceability in industrial control systems.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
After linearizing the non-linear sensor-actuator relationships, a giant-step baby-step classifier detects anomalies in real time, returns millisecond-scale responses, and supplies traceable explanations that identify the responsible sensor or actuation state, reaching 97.72 percent accuracy on a water treatment testbed by classifying safe-limit deviations as non-anomalous.
What carries the argument
Giant-step baby-step classifier applied to linearized sensor-actuator models, performing classification that preserves component-level traceability.
Load-bearing premise
Linear approximations of non-linear sensor-actuator dynamics retain enough information to separate anomalies from normal safe variations.
What would settle it
Applying the classifier to an industrial control system whose non-linear dynamics differ substantially from the water treatment testbed and observing a large drop in accuracy or loss of traceability.
Figures
read the original abstract
The continuous monitoring of the interactions between cyber-physical components of any industrial control system (ICS) is required to secure automation of the system controls, and to guarantee plant processes are fail-safe and remain in an acceptably safe state. Safety is achieved by managing actuation (where electric signals are used to trigger physical movement), dependent on corresponding sensor readings; used as ground truth in decision making. Timely detection of anomalies (attacks, faults and unascertained states) in ICSs is crucial for the safe running of a plant, the safety of its personnel, and for the safe provision of any services provided. We propose an anomaly detection method that involves accurate linearization of the non-linear forms arising from sensor-actuator(s) relationships, primarily because solving linear models is easier and well understood. We accomplish this by using a well-known water treatment testbed as a use case. Our experiments show millisecond time response to detect anomalies, all of which are explainable and traceable; this simultaneous coupling of detection speed and explainability has not been achieved by other state of the art Artificial Intelligence (AI)/ Machine Learning (ML) models with eXplainable AI (XAI) used for the same purpose. Our methods explainability enables us to pin-point the sensor(s) and the actuation state(s) for which the anomaly was detected. The proposed algorithm showed an accuracy of 97.72% by flagging deviations within safe operation limits as non-anomalous; indicative that slower detectors with highest detection resolution is unnecessary, for systems whose safety boundaries provide leeway within safety limits.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper proposes a Giant-Step Baby-Step Classifier for anomaly detection in industrial control systems (ICS) and water treatment systems. It centers on accurate linearization of inherently non-linear sensor-actuator relationships to enable fast, explainable detection, reporting 97.72% accuracy on a water treatment testbed by treating deviations within safe limits as non-anomalous, along with millisecond response times and traceability to specific sensors/actuators. The authors assert this simultaneously achieves speed and explainability not attained by prior AI/ML models with XAI.
Significance. If the linearization step preserves anomaly-discriminating information and the performance generalizes, the work would offer a useful practical contribution to real-time ICS security by providing both low-latency detection and component-level traceability, addressing a gap where many XAI approaches trade off one for the other. The focus on safe-operation leeway as a design principle is a constructive element.
major comments (2)
- [Abstract and method description of linearization] The central performance claims (97.72% accuracy, millisecond latency, and traceability) rest on the linearization procedure, yet the manuscript supplies no quantitative bound on the linearization residual, no sensitivity analysis showing the size of deviation that can be masked by the approximation, and no evaluation on a second ICS domain beyond the single water-treatment testbed. This directly undermines the claim that the method works outside the reported experiments.
- [Abstract and experimental results] No baselines, error analysis, or comparative results against SOTA XAI models are presented to support the superiority assertion; the accuracy figure is stated without derivation details, cross-validation, or discussion of how thresholds were chosen, making the experimental evidence insufficient to substantiate the headline claims.
minor comments (1)
- [Abstract] The abstract refers to a 'well-known water treatment testbed' without naming it (e.g., SWaT or WADI), which reduces reproducibility; adding the exact testbed identifier and any public dataset references would help.
Simulated Author's Rebuttal
We thank the referee for their careful reading and constructive comments. We address each major comment below and indicate planned revisions to improve the manuscript.
read point-by-point responses
-
Referee: [Abstract and method description of linearization] The central performance claims (97.72% accuracy, millisecond latency, and traceability) rest on the linearization procedure, yet the manuscript supplies no quantitative bound on the linearization residual, no sensitivity analysis showing the size of deviation that can be masked by the approximation, and no evaluation on a second ICS domain beyond the single water-treatment testbed. This directly undermines the claim that the method works outside the reported experiments.
Authors: We agree that an explicit quantitative bound on the linearization residual and a sensitivity analysis are not currently provided. The linearization approximates non-linear sensor-actuator relationships within the safe-operation envelope, treating deviations inside those bounds as non-anomalous by design. We will add a dedicated subsection deriving an error bound using the maximum observed deviation from normal-operation data and a first-order Taylor approximation residual. A sensitivity analysis showing the largest masked deviation will also be included. Regarding a second ICS domain, the current work focuses on the water-treatment testbed as a canonical ICS example; adding another domain would require new instrumentation and attack datasets that are outside the scope of this revision. We will explicitly state this limitation in the discussion and revise the abstract to qualify the generalization claim. revision: partial
-
Referee: [Abstract and experimental results] No baselines, error analysis, or comparative results against SOTA XAI models are presented to support the superiority assertion; the accuracy figure is stated without derivation details, cross-validation, or discussion of how thresholds were chosen, making the experimental evidence insufficient to substantiate the headline claims.
Authors: The reported accuracy of 97.72% is computed on the labeled testbed dataset by counting detections where the linearized prediction error exceeds the pre-defined safe-limit threshold. We will expand the experimental section with: (i) explicit derivation of the threshold from the 99th-percentile residual on normal data, (ii) 5-fold cross-validation results, and (iii) an error analysis breaking down false positives and negatives by sensor/actuator. Direct quantitative comparisons against SOTA XAI models were not performed because the method’s primary contribution is millisecond latency with built-in traceability rather than post-hoc explanation. We will revise the abstract and conclusion to replace the superiority claim with a statement that the approach simultaneously achieves real-time detection and component-level explainability, and add a qualitative comparison table against representative XAI methods in the related-work section. revision: partial
- Evaluation on a second ICS domain, which would require new testbed instrumentation and attack data collection not feasible within the current revision timeline.
Circularity Check
No circularity in derivation chain
full rationale
The paper proposes linearization of non-linear sensor-actuator relationships as the core modeling step for anomaly detection, then reports empirical results (97.72% accuracy, millisecond latency, traceability) obtained by running the resulting classifier on a single well-known water-treatment testbed. No equations, parameter-fitting steps, or self-citations are shown that reduce the claimed performance figures or the linearization itself to the inputs by construction. The accuracy metric is an observed outcome on the validation data rather than a tautological prediction, and the method is presented as an engineering approximation whose validity is checked externally against the testbed traces. The derivation is therefore self-contained.
Axiom & Free-Parameter Ledger
free parameters (1)
- Linearization coefficients or thresholds
axioms (1)
- domain assumption The water treatment testbed sufficiently represents real-world ICS dynamics for anomaly detection evaluation.
Reference graph
Works this paper leans on
-
[1]
Jaikaran, Cybersecurity: Selected Cyberattacks, 2012-2022 (Last up- dated - August, 2023)
C. Jaikaran, Cybersecurity: Selected Cyberattacks, 2012-2022 (Last up- dated - August, 2023)
work page 2012
-
[2]
TRENDMICRO, German Steel Plant Suffers Significant Damage from Targeted Attack (January 12, 2015)
work page 2015
-
[3]
R. M. Lee, M. J. Assante, T. Conway, ICS CP/PE (Cyber-to-Physical or Process Effects) case study paper – German Steel Mill Cyber Attack (Dec 30, 2014)
work page 2014
-
[4]
Dean Parsons, What’s the Scoop on FrostyGoop: The Latest ICS Mal- ware and ICS Controls Considerations (August 9, 2024)
work page 2024
-
[5]
Marshall Abrams and Joe Weiss, Malicious Control System Cyber Secu- rity Attack Case Study – Maroochy Water Services, Australia (2008)
work page 2008
-
[6]
James, 11 recent cyber attacks on the water and wastewater sector (October 13, 2024)
work page 2024
-
[7]
Trevor Quinn, Anti-Israeli hackers leave 180 Mayo homes without water in cyberattack (December 7, 2023)
work page 2023
-
[8]
Andy Greenberg, A Hacker Tried to Poison a Florida City’s Water Supply, Officials Say (February 8, 2021)
work page 2021
-
[9]
J. Goh, S. Adepu, K. N. Junejo, A. P. Mathur, A dataset to support research in the design of secure water treatment systems, in: Critical Information Infrastructures Security, Cham, 2017, pp. 88–99
work page 2017
-
[10]
Z. Li, Y . Zhao, X. Hu, N. Botta, C. Ionescu, G. Chen, ECOD: Un- supervised Outlier Detection Using Empirical Cumulative Distribution Functions, IEEE Transactions on Knowledge and Data Engineering (2022) 1–1
work page 2022
-
[11]
L. Ruff, N. G ¨ornitz, L. Deecke, S. A. Siddiqui, R. A. Vandermeulen, A. Binder, E. M¨uller, M. Kloft, Deep One-Class Classification, in: ICML, 2018, pp. 4390–4399
work page 2018
-
[12]
K. Mathuros, S. Venugopalan, S. Adepu, WaXAI: Explainable Anomaly Detection in Industrial Control Systems and Water Systems, in: Proceed- ings of the 10th ACM Cyber-Physical System Security Workshop, CPSS ’24, ACM, New York, NY , USA, 2024, p. 3–15
work page 2024
-
[13]
C. Feng, V . R. Palleti, A. Mathur, D. Chana, A systematic framework to generate invariants for anomaly detection in industrial control systems, Network and Distributed System Security (NDSS) Symposium, 2019
work page 2019
-
[14]
S. Ali, T. Abuhmed, S. El-Sappagh, K. Muhammad, J. M. Alonso-Moral, R. Confalonieri, R. Guidotti, J. Del Ser, N. D ´ıaz-Rodr´ıguez, F. Herrera, Explainable Artificial Intelligence (XAI): What we know and what is left to attain Trustworthy Artificial Intelligence, Information Fusion 99 (2023) 101805
work page 2023
- [15]
-
[16]
J. Cao, H. Dai, B. Lei, C. Yin, H. Zeng, A. Kummert, Maximum Cor- rentropy Criterion-Based Hierarchical One-Class Classification, IEEE Transactions on Neural Networks and Learning Systems 32 (8) (2021) 3748–3754
work page 2021
-
[17]
CAPEC, CAPEC VIEW: Domains of Attack (Version 3.9) (Accessed on 8 February, 2025)
work page 2025
- [18]
-
[19]
R. Bentley, A. Sarkar, Humans in AI: The necessity for human-in-the- loop (HILT) (Jun 18, 2024)
work page 2024
-
[20]
T. Clemmensen, M. T. Moghaddam, J. Nørbjerg, Cyber-physical sys- tems with Human-in-the-Loop: A systematic review of socio-technical perspectives, Journal of Systems and Software 226 (2025) 112348
work page 2025
-
[21]
L. Yuan, S. Yu, Z. Yang, M. Duan, K. Li, A data balancing approach based on generative adversarial network, Future Generation Computer Systems 141 (2023) 768–776
work page 2023
-
[22]
C. M. Ahmed, G. R. M R, A. P. Mathur, Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems, in: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, CPSS ’20, Association for Computing Machinery, New York, NY , USA, 2020, p. 23–29
work page 2020
-
[23]
Chakrabarty, CS 31: Algorithms (Spring 2019): Lecture 19 (2019)
D. Chakrabarty, CS 31: Algorithms (Spring 2019): Lecture 19 (2019)
work page 2019
-
[24]
D. I. Urbina, J. A. Giraldo, A. A. Cardenas, N. O. Tippenhauer, J. Valente, M. Faisal, J. Ruths, R. Candell, H. Sandberg, Limiting the Impact of Stealthy Attacks on Industrial Control Systems, CCS ’16, ACM, New York, NY , USA, 2016, p. 1092–1105
work page 2016
-
[25]
Safety devices for protection against excessive pressure (Reviewed and Confirmed, 2025)
ISO, ISO 4126-1:2013. Safety devices for protection against excessive pressure (Reviewed and Confirmed, 2025)
work page 2013
-
[26]
A. L. Buczak, E. Guven, A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection, IEEE Communications Surveys & Tutorials 18 (2) (2016) 1153–1176
work page 2016
- [27]
-
[28]
X. Xu, Y . Lai, X. Zhang, X. Dong, Abnormal Logical Representation Learning for Intrusion Detection in Industrial Control Systems, IEEE Transactions on Industrial Informatics 20 (8) (2024) 10624–10635
work page 2024
-
[29]
M. R. G. Raman, A. P. Mathur, A Hybrid Physics-Based Data-Driven Framework for Anomaly Detection in Industrial Control Systems, IEEE Transactions on Systems, Man, and Cybernetics: Systems 52 (9) (2022) 6003–6014
work page 2022
-
[30]
Y . K. Saheed, S. Misra, S. Chockalingam, Autoencoder via DCNN and LSTM Models for Intrusion Detection in Industrial Control Systems of Critical Infrastructures, in: 2023 IEEE/ACM 4th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS), 2023, pp. 9–16
work page 2023
-
[31]
S. Adepu, A. Mathur, Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant, in: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ASIA CCS ’16, Association for Computing Machinery, New York, NY , USA, 2016, p. 449–460
work page 2016
-
[32]
C. H. Yoong, V . R. Palleti, R. R. Maiti, A. Silva, C. M. Poskitt, Deriving invariant checkers for critical infrastructure using axiomatic design principles, Cybersecur. 4 (1) (2021) 6
work page 2021
- [33]
-
[34]
M. Mehmood, Z. Baig, N. Syed, Securing Industrial Control Systems (ICS) Through Attack Modelling and Rule-Based Learning, in: 2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS), 2024, pp. 598–602
work page 2024
-
[35]
S. M. Lundberg, S.-I. Lee, A unified approach to interpreting model predictions, in: Proceedings of the 31st International Conference on Neural Information Processing Systems, NIPS’17, Curran Associates Inc., Red Hook, NY , USA, 2017, p. 4768–4777
work page 2017
-
[36]
M. T. Ribeiro, S. Singh, C. Guestrin, ”Why Should I Trust You?”: Explaining the Predictions of Any Classifier, CoRR abs/1602.04938 (2016).arXiv:1602.04938
work page internal anchor Pith review Pith/arXiv arXiv 2016
-
[37]
D. W. Apley, J. Zhu, Visualizing the Effects of Predictor Variables in Black Box Supervised Learning Models, Journal of the Royal Statistical Society Series B: Statistical Methodology 82 (4) (2020) 1059–1086
work page 2020
-
[38]
Axiomatic Attribution for Deep Networks
M. Sundararajan, A. Taly, Q. Yan, Axiomatic Attribution for Deep Networks, CoRR abs/1703.01365 (2017).arXiv:1703.01365
work page internal anchor Pith review Pith/arXiv arXiv 2017
-
[39]
A. Avdalovic, J. Khoury, A. Taha, E. Bou-Harb, Enhancing Network Se- curity Management in Water Systems using FM-based Attack Attribution (2025).arXiv:2503.01229
-
[40]
C. Fung, E. Zeng, L. Bauer, Attributions for ML-based ICS Anomaly Detection: From Theory to Practice, in: 31st Annual Network and Dis- tributed System Security Symposium, NDSS San Diego, USA, February 26 - March 1, 2024, The Internet Society, 2024
work page 2024
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.