Rule-Based With Machine Learning IDS for DDoS Attack Detection in Cyber-Physical Production Systems (CPPS)

被引:5
作者
Hussain, Ayaz [1 ]
Marin Tordera, Eva [1 ]
Masip-Bruin, Xavi [1 ]
Leligou, Helen C. [2 ]
机构
[1] Univ Politecn Catalunya UPC, CRAAX Lab, Vilanova I La Geltru 08800, Spain
[2] Univ West Attica, Dept Ind Design & Prod Engn, Aegaleo 12243, Greece
关键词
Real-time systems; Denial-of-service attack; Supply chains; Production systems; Machine learning; Training; Security; Knowledge based systems; CPPS; DDoS attacks; Industry; 4.0; IDS solution; machine learning; rule-based detection; INTRUSION DETECTION; NETWORK; INTERNET;
D O I
10.1109/ACCESS.2024.3445261
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent advancements in communication technology have transformed the way the industrial system works. This digitalization has improved the way of communication between different actors involved in cyber physical production systems (CPPS), such as users, suppliers, and manufacturers, thus making the whole process transparent. The utilization of emerging new technologies in CPPS can cause vulnerable spots that can be exploited by attackers to launch sophisticated distributed denial of service (DDoS) attacks, hence threatening the availability of the production systems. Existing machine learning based intrusion detection systems (IDS) often rely on unrealistic datasets for training and validation, thus missing the crucial testing phase with real-time scenarios. The results generated by the ML models are based on predictions at each flow level and cannot provide summarized information about malicious entities. To address this limitation, this study proposed an efficient IDS system that uses both rule-based detection and ML-based approaches to detect DDoS attacks damaging the infrastructure of CPPS. For training and validation of the system, we use real-time network traffic extracted from a real industrial scenario, referred to as Farm-to-Fork (F2F) supply chain system. Both, attacks and normal traffic were captured, and bidirectional features were extracted through CIC-FLOWMETER. We make use of 8 ML supervised and unsupervised approaches to detect the malicious flows; and then a rule-based detection mechanism is used to calculate the frequency of the malicious flows and to assign different severity levels based on the computed frequency. The overall results show that supervised models outperform unsupervised approaches and achieve an accuracy 99.97% and TPR 99.96%. Overall, the weighted accuracy when tested and deployed in a real-time scenario is around 98.71%. The results prove that the system works better when considering real-time scenarios and provides comprehensive information about the detected results that can be used to take different mitigation actions.
引用
收藏
页码:114894 / 114911
页数:18
相关论文
共 42 条
[1]  
Ahanger Aamir S., 2021, Proceedings of 5th International Conference on Computing Methodologies and Communication (ICCMC 2021), P1639, DOI 10.1109/ICCMC51019.2021.9418291
[2]   An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System [J].
Al-Abassi, Abdulrahman ;
Karimipour, Hadis ;
Dehghantanha, Ali ;
Parizi, Reza M. .
IEEE ACCESS, 2020, 8 :83965-83973
[3]   Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System [J].
Alzahrani, Ali ;
Aldhyani, Theyazn H. H. .
SUSTAINABILITY, 2023, 15 (10)
[4]   Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection [J].
Aminanto, Muhamad Erza ;
Choi, Rakyong ;
Tanuwidjaja, Harry Chandra ;
Yoo, Paul D. ;
Kim, Kwangjo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) :621-636
[5]   A measurement method for intrusion detection in cyber IoT data stealing attacks [J].
Amodei, A. ;
Capriglione, D. ;
Ferrigno, L. ;
Miele, G. ;
Tomasso, G. ;
Cerro, G. .
2023 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE, I2MTC, 2023,
[6]  
Barbosa RRR, 2010, LECT NOTES COMPUT SC, V6155, P163, DOI 10.1007/978-3-642-13986-4_23
[7]  
Borges Pedro, 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), P1034, DOI 10.23919/INM.2017.7987434
[8]   Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge [J].
Casas, Pedro ;
Mazel, Johan ;
Owezarski, Philippe .
COMPUTER COMMUNICATIONS, 2012, 35 (07) :772-783
[9]  
Cetin B, 2019, IEEE INT CONF BIG DA, P6004, DOI [10.1109/bigdata47090.2019.9005507, 10.1109/BigData47090.2019.9005507]
[10]   Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset [J].
Chatzoglou, Efstratios ;
Kambourakis, Georgios ;
Kolias, Constantinos .
IEEE ACCESS, 2021, 9 :34188-34205