Industrial control system intrusion detection method based on belief rule base with gradient descent

被引:0
作者
Li, Jinyuan [1 ]
Qian, Guangyu [1 ,2 ]
He, Wei [1 ]
Zhang, Wei [1 ]
机构
[1] Harbin Normal Univ, Sch Comp Sci & Informat Engn, Harbin 150025, Peoples R China
[2] China Univ Min & Technol, Sch Informat & Control Engn, Xuzhou 221116, Peoples R China
关键词
BRB expert system; Industrial control; Intrusion detection; Gradient methods; Hybrid systems; PARTICLE SWARM OPTIMIZATION; INFERENCE; KNOWLEDGE; IOT;
D O I
10.1016/j.cose.2025.104488
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection is important for maintaining the smooth operation of industrial control systems (ICSs). The belief rule base (BRB), as a hybrid information-driven model, has been widely used in various fields because of its high accuracy and good interpretability. However, when facing intrusion detection problems in ICSs with highdimensional features, excessive rules often arise, leading to slow model inference and optimization due to the large number of rules. Therefore, this paper proposes an interval structure belief rule base with mini-batch gradient descent optimization (IBRB-MBGD) for ICS intrusion detection. First, to address the issue of rule explosion caused by high-dimensional features, a new modeling approach is proposed that uses reference intervals instead of single values, and the rule generation mode is changed from conjunction to disjunction, further improving the model inference method and effectively solving the combination rule explosion. Second, the large amount of historical data slows down the model optimization process; thus, an optimization method based on minibatch gradient descent is proposed to quickly optimize the parameters in the BRB. Finally, experiments were conducted on natural gas pipeline system and water storage tank system intrusion detection data, and the detection rate reached >90 %, verifying the effectiveness of the model.
引用
收藏
页数:21
相关论文
共 46 条
  • [1] Hybrid belief rule base for regional railway safety assessment with data and knowledge under uncertainty
    Chang, Leilei
    Dong, Wei
    Yang, Jianbo
    Sun, Xinya
    Xu, Xiaobin
    Xu, Xiaojian
    Zhang, Limao
    [J]. INFORMATION SCIENCES, 2020, 518 : 376 - 395
  • [2] Structure learning for belief rule base expert system: A comparative study
    Chang, Leilei
    Zhou, Yu
    Jiang, Jiang
    Li, Mengjun
    Zhang, Xiaohang
    [J]. KNOWLEDGE-BASED SYSTEMS, 2013, 39 : 159 - 172
  • [3] A new interval constructed belief rule base with rule reliability
    Cheng, Xiaoyu
    Han, Peng
    He, Wei
    Zhou, Guohui
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (14) : 15835 - 15867
  • [4] Imbalanced data classification: A KNN and generative adversarial networks-based hybrid approach for intrusion detection
    Ding, Hongwei
    Chen, Leiyang
    Dong, Liang
    Fu, Zhongwang
    Cui, Xiaohui
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 131 : 240 - 254
  • [5] A fast belief rule base generation and reduction method for classification problems
    Gao, Fei
    Bi, Wenhao
    [J]. INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2023, 160
  • [6] Detecting intrusion with rule-based integration of multiple models
    Han, SJ
    Cho, SB
    [J]. COMPUTERS & SECURITY, 2003, 22 (07) : 613 - 623
  • [7] Machine learning with Belief Rule-Based Expert Systems to predict stock price movements
    Hossain, Emam
    Hossain, Mohammad Shahadat
    Zander, Par-Ola
    Andersson, Karl
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2022, 206
  • [8] Hidden behavior prediction of complex system based on time-delay belief rule base forecasting model
    Hu, Guan-Yu
    Zhou, Zhi-Jie
    Hu, ChangHua
    Zhang, Bang-Cheng
    Zhou, Zhi-Guo
    Zhang, Yang
    Wang, Guo-Zhu
    [J]. KNOWLEDGE-BASED SYSTEMS, 2020, 203 (203)
  • [9] A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection
    Hu, Jiankun
    Yu, Xinghuo
    Qiu, D.
    Chen, Hsiao-Hwa
    [J]. IEEE NETWORK, 2009, 23 (01): : 42 - 47
  • [10] STATE TRANSITION ANALYSIS - A RULE-BASED INTRUSION DETECTION APPROACH
    ILGUN, K
    KEMMERER, RA
    PORRAS, PA
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1995, 21 (03) : 181 - 199