Attack Target Detection Using Machine Learning on SCADA Gas Pipeline Data

被引:1
作者
Buslon, Michelle [1 ]
Park, Chol Hyun [1 ]
Kim, Yoohwan [1 ]
Jo, Ju-Yeon [1 ]
机构
[1] Univ Nevada Las Vegas, Comp Sci, Las Vegas, NV 89154 USA
来源
2023 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE, CSCI 2023 | 2023年
关键词
Machine Learning; SCADA; Cybersecurity; IoT;
D O I
10.1109/CSCI62032.2023.00152
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Supervisory Control and Data Acquisition (SCADA) architecture is at the core of industrial organizations, such as factories and power plants. Within the SCADA system is a network of devices gathering and monitoring data. As the number of devices or components increases, so does the number of potential attack points. It is crucial to prevent and mitigate attacks on SCADA systems in order to stop a complete loss of the system to an attacker. Detecting the specific target point of the attack will allow for quicker isolation and mitigation without requiring the shutdown of the whole system. This paper explores the use of machine learning models, particularly Random Forest (RF), Gradient Boosting Classifier (GB), AdaBoosted Classifier (AB), a Deep Neural Network (DNN), and other previously proposed models, comparing their performance in identifying the attack target in a SCADA environment for gas pipeline data.
引用
收藏
页码:910 / 914
页数:5
相关论文
共 14 条
[1]   Enhanced Vulnerability Detection in SCADA Systems using Hyper-Parameter-Tuned Ensemble Learning [J].
Ahakonye, Love Allen Chijioke ;
Amaizu, Gabriel Chukwunonso ;
Nwakanma, Cosmas Ifeanyi ;
Lee, Jae Min ;
Kim, Dong-Seong .
12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, :458-461
[2]   A Self-Tuning Cyber-Attacks' Location Identification Approach for Critical Infrastructures [J].
Alabassi, Abdul ;
Jahromi, Amir Namavar ;
Karimipour, Hadis ;
Dehghantanha, Ali ;
Siano, Pierluigi ;
Leung, Henry .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (07) :5018-5027
[3]   On the Performance of Isolation Forest and Multi Layer Perceptron for Anomaly Detection in Industrial Control Systems Networks [J].
Alqurashi, Saja ;
Shirazi, Hossein ;
Ray, Indrakshi .
2021 EIGHTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2021, :161-166
[4]   Cyber Security in Power Systems Using Meta-Heuristic and Deep Learning Algorithms [J].
Diaba, Sayawu Yakubu ;
Shafie-Khah, Miadreza ;
Elmusrati, Mohammed .
IEEE ACCESS, 2023, 11 :18660-18672
[5]   Evaluating Machine Learning approaches for Cyber and Physical anomalies in SCADA systems [J].
Faramondi, L. ;
Flammini, F. ;
Guarino, S. ;
Setola, R. .
2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, :412-417
[6]  
Kbean Nadia A. W., 2020, 2020 6th International Engineering Conference, Sustainable Technology and Development (IEC). Proceedings, P97, DOI 10.1109/IEC49899.2020.9122853
[7]   Attacking and Defending DNP3 ICS/SCADA Systems [J].
Kelli, Vasiliki ;
Radoglou-Grammatikis, Panagiotis ;
Sesis, Achilleas ;
Lagkas, Thomas ;
Fountoukidis, Eleftherios ;
Kafetzakis, Emmanouil ;
Giannoulakis, Ioannis ;
Sarigiannidis, Panagiotis .
18TH ANNUAL INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS 2022), 2022, :183-190
[8]  
Mabunda N., 2022, P 2022 INT C ART INT, P1, DOI [10.1109/ICAIoT57170.2022.10121852, DOI 10.1109/ICAIOT57170.2022.10121852]
[9]   Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic [J].
MontazeriShatoori, Mohammadreza ;
Davidson, Logan ;
Kaur, Gurdip ;
Lashkari, Arash Habibi .
2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, :63-70
[10]  
Morris T, 2014, IFIP ADV INF COMM TE, V441, P65