Improving the Performance of IIoT Intrusion Detection System Using Hybrid Synthetic Data

被引:1
作者
Chen, Chia-Mei [1 ]
Hsu, Chi-Hsuen [1 ]
Cai, Zheng-Xun [1 ]
Lai, Gu-Hsin [2 ]
Ou, Ya-Hui [3 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Informat Management, Kaohsiung, Taiwan
[2] Taiwan Police Coll, Dept Technol Crime Invest, Taipei, Taiwan
[3] Natl Penghu Univ, Gen Competency Ctr, Magong, Penghu, Taiwan
来源
2024 19TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY, ASIAJCIS 2024 | 2024年
关键词
Generative Adversarial Networks; Synthetic Data; Industrial Internet of Things;
D O I
10.1109/AsiaJCIS64263.2024.00020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The convergence of Industrial Control Systems (ICS) and Information Technology networks has enabled manufacturers to embrace modern automation technologies with the Industrial Internet of Things (IIoTs). However, the existing ICS network protocols lack robust security mechanisms, as they were originally designed for isolated environments. This vulnerability has exposed ICS networks to emerging cyber threats, necessitating the development of robust intrusion detection systems to promptly alert security personnel. The effectiveness of an IDS heavily depends on the quality and quantity of its training data. Insufficient and imbalanced data present challenges that impact detection rates. Generative Adversarial Networks (GANs) offer a solution by generating realistic data based on existing information. This study utilizes Conditional Tabular GAN, known as CTGAN, tailored for generating tabular data, along with traditional fuzzing for synthetic data generation. Specific rules are defined to ensure data accuracy. Evaluation results demonstrate that IDS trained with a combination of CTGAN, fuzzing data, and existing data yields the best performance.
引用
收藏
页码:62 / 68
页数:7
相关论文
共 23 条
[1]  
Alqarni AA, 2022, INT J ADV COMPUT SC, V13, P959
[2]  
Best R., Converged OT/IT Networks Introduce New Security Risks
[3]   The industrial internet of things (IIoT): An analysis framework [J].
Boyes, Hugh ;
Hallaq, Bit ;
Cunningham, Joe ;
Watson, Tim .
COMPUTERS IN INDUSTRY, 2018, 101 :1-12
[4]  
Brooks C. J., 2022, Practical industrial cybersecurity: ICS, industry 4.0, and IIoT
[5]  
Diep NN, 2017, Southeast Asian Journal of Sciences, V5, P111
[6]   Generative Adversarial Networks [J].
Goodfellow, Ian ;
Pouget-Abadie, Jean ;
Mirza, Mehdi ;
Xu, Bing ;
Warde-Farley, David ;
Ozair, Sherjil ;
Courville, Aaron ;
Bengio, Yoshua .
COMMUNICATIONS OF THE ACM, 2020, 63 (11) :139-144
[7]  
Hemanna N., Is your OT-IT network fully Isolated and secure?
[8]   Evaluating Fuzz Testing [J].
Klees, George ;
Ruef, Andrew ;
Cooper, Benji ;
Wei, Shiyi ;
Hicks, Michael .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :2123-2138
[9]  
Kosmowski K., 2021, Business continuity management framework for Industry 4.0 companies regarding dependability and security of the ICT and ICS/SCADA system
[10]   Fuzzing: a survey [J].
Li, Jun ;
Zhao, Bodong ;
Zhang, Chao .
CYBERSECURITY, 2018, 1 (01)