Multigranularity Feature Automatic Marking-Based Deep Learning for Anomaly Detection of Industrial Control Systems

被引:1
作者
Du, Xinyi [1 ,2 ,3 ]
Xu, Chi [2 ,3 ]
Li, Lin [2 ]
Li, Xinchun [1 ]
机构
[1] Liaoning Tech Univ, Sch Elect & Informat Engn, Huludao 125105, Peoples R China
[2] Chinese Acad Sci, Shenyang Inst Automat, State Key Lab Robot, Shenyang 110016, Peoples R China
[3] Chinese Acad Sci, Key Lab Networked Control Syst, Shenyang 110016, Peoples R China
来源
IEEE OPEN JOURNAL OF INSTRUMENTATION AND MEASUREMENT | 2024年 / 3卷
基金
中国国家自然科学基金;
关键词
Protocols; Feature extraction; Anomaly detection; Deep learning; Industrial control; Convolutional neural networks; Security; convolutional neural network; deep learning; feature automatic marking; feature extraction; industrial control protocol (ICP);
D O I
10.1109/OJIM.2024.3418466
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Industrial control systems are facing ever-increasing security challenges due to the large-scale access of heterogeneous devices in the open Internet environment. Existing anomaly detection methods are mainly based on the priori knowledge of industrial control protocols (ICPs) whose protocol specifications, communication mechanism, and data format are already known. However, when these knowledge are blank, namely, unknown ICPs, existing methods become powerless to detect the anomaly data. To tackle this challenge, we propose a multigranularity feature automatic marking-based deep learning method to classify unknown ICPs for anomaly detection. First, to obtain the feature sequences without priori knowledge assisting, we propose a multigranularity feature extraction algorithm to extract both byte and half-byte information by fully utilizing the intensive key information in the header field of the application layer. Then, to label the feature sequences for deep learning, we propose a feature automatic marking algorithm that utilizes the inconsistency feature sequences to dynamically update the feature sequence set. With the labeled feature sequences, we employ deep learning with 1-D convolutional neural network and gated recurrent unit to classify the unknown ICPs and realize anomaly detection. Extensive experiments on two public datasets show that both the accuracy and precision of the proposed method reach above 98.4%, which is better than the three benchmark methods.
引用
收藏
页数:10
相关论文
共 24 条
[1]  
[Anonymous], Network forensics and network security monitoring
[2]   An Enhanced Method for Reverse Engineering CAN Data Payload [J].
Choi, Wonsuk ;
Lee, Seyoung ;
Joo, Kyungho ;
Jo, Hyo Jin ;
Lee, Dong Hoon .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (04) :3371-3381
[3]  
Huang J.-C., 2023, Comput. Security, V132
[4]   Protocol Reverse-Engineering Methods and Tools: A Survey [J].
Huang, Yuyao ;
Shu, Hui ;
Kang, Fei ;
Guang, Yan .
COMPUTER COMMUNICATIONS, 2022, 182 :238-254
[5]   Industrial Control System Anomaly Detection and Classification Based on Network Traffic [J].
Jiang, Jehn-Ruey ;
Chen, Yan-Ting .
IEEE ACCESS, 2022, 10 :41874-41888
[6]  
Jin Kai, 2023, 2023 42nd Chinese Control Conference (CCC), P8876, DOI 10.23919/CCC58697.2023.10240673
[7]   Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis [J].
Kleber, Stephan ;
Maile, Lisa ;
Kargl, Frank .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01) :526-561
[8]   TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT [J].
Lin, Kunda ;
Xu, Xiaolong ;
Gao, Honghao .
COMPUTER NETWORKS, 2021, 190
[9]   An intrusion detection method for industrial control systems based on bidirectional simple recurrent unit [J].
Ling, Jie ;
Zhu, Zhishen ;
Luo, Yu ;
Wang, Hao .
COMPUTERS & ELECTRICAL ENGINEERING, 2021, 91
[10]   READ: Reverse Engineering of Automotive Data Frames [J].
Marchetti, Mirco ;
Stabili, Dario .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) :1083-1097