CGAAD: Centrality- and Graph-Aware Deep-Learning Model for Detecting Cyberattacks Targeting Industrial Control Systems in Critical Infrastructure

被引:4
作者
Alrumaih, Thuraya N. I. [1 ]
Alenazi, Mohammed J. F. [1 ]
机构
[1] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Engn, Riyadh 11362, Saudi Arabia
关键词
Critical infrastructure cyber-resilience; cyberattack detection; graph-aware deep learning (DL); graph convolution network (GCN); industrial control system (ICS) cybersecurity; ATTACK DETECTION; SECURITY;
D O I
10.1109/JIOT.2024.3390691
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial control systems (ICSs) are crucial in managing critical infrastructure, making their security a paramount concern. In recent years, their widespread adoption, together with the overall distance spanned by the critical infrastructure of industrial communication networks, have increased the complexity of the networks' topological arrangement, increasing their structural vulnerabilities. In this scenario, deep-learning models, especially those that incorporate graph-aware mechanisms, have arisen as a promising solution. This article presents a novel centrality- and graph-aware attack detector (CGAAD) that includes nodes' significance by centrality measures within a graph convolution network (GCN) framework to provide superior cyberattack detection performance and increase the resilience of critical ICS infrastructure. The proposed CGAAD model is in three parts. First, centrality measures are used as features for each of the nodes in the ICS graph topology. Then, a sparse-autoencoder (sparse-AE) enhances the feature representations to harness the subsequent classification step. Finally, the GCN leverages the graph structure and the enhanced features to classify dataflow between nodes as either normal or attacked. Experimental results demonstrate promising performance, reaching nearly 99% in terms of accuracy and F1-score, reducing misclassifications of both normal and attacked samples, which is crucial in ICS critical infrastructure applications.
引用
收藏
页码:24162 / 24182
页数:21
相关论文
共 69 条
[1]   On the k-independence number of graphs [J].
Abiad, A. ;
Coutinho, G. ;
Fiol, M. A. .
DISCRETE MATHEMATICS, 2019, 342 (10) :2875-2885
[2]   A Survey of Cyber-Physical Attacks and Detection Methods in Smart Water Distribution Systems [J].
Addeen, Hajar Hameed ;
Xiao, Yang ;
Li, Jiacheng ;
Guizani, Mohsen .
IEEE ACCESS, 2021, 9 :99905-99921
[3]  
Ahmadi-Assalemi G, 2022, Arxiv, DOI arXiv:2209.12041
[4]  
Ahmed C. M., 2017, P 3 INT WORKSH CYB P, P25
[5]   An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System [J].
Al-Abassi, Abdulrahman ;
Karimipour, Hadis ;
Dehghantanha, Ali ;
Parizi, Reza M. .
IEEE ACCESS, 2020, 8 :83965-83973
[6]   Misconfiguration in Firewalls and Network Access Controls: Literature Review [J].
Alicea, Michael ;
Alsmadi, Izzat .
FUTURE INTERNET, 2021, 13 (11)
[7]  
Alimi Oyeniyi Akeem, 2021, 2021 IEEE AFRICON, DOI 10.1109/AFRICON51333.2021.9570951
[8]   Cyber resilience in industrial networks: A state of the art, challenges, and future directions [J].
Alrumaih, Thuraya N. I. ;
Alenazi, Mohammed J. F. ;
AlSowaygh, Nouf A. ;
Humayed, Abdulmalik A. ;
Alablani, Ibtihal A. .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (09)
[9]   Evaluation of industrial network robustness against targeted attacks [J].
Alrumaih, Thuraya N. I. ;
Alenazi, Mohammed J. F. .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (27)
[10]  
Andrew Ng, 2011, CS294A Lecture notes, V2011, P1, DOI DOI 10.1371/JOURNAL.PONE.0006098