Industrial control system intrusion detection method based on belief rule base with gradient descent

被引:0
作者
Li, Jinyuan [1 ]
Qian, Guangyu [1 ,2 ]
He, Wei [1 ]
Zhang, Wei [1 ]
机构
[1] Harbin Normal Univ, Sch Comp Sci & Informat Engn, Harbin 150025, Peoples R China
[2] China Univ Min & Technol, Sch Informat & Control Engn, Xuzhou 221116, Peoples R China
关键词
BRB expert system; Industrial control; Intrusion detection; Gradient methods; Hybrid systems; PARTICLE SWARM OPTIMIZATION; INFERENCE; KNOWLEDGE; IOT;
D O I
10.1016/j.cose.2025.104488
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection is important for maintaining the smooth operation of industrial control systems (ICSs). The belief rule base (BRB), as a hybrid information-driven model, has been widely used in various fields because of its high accuracy and good interpretability. However, when facing intrusion detection problems in ICSs with highdimensional features, excessive rules often arise, leading to slow model inference and optimization due to the large number of rules. Therefore, this paper proposes an interval structure belief rule base with mini-batch gradient descent optimization (IBRB-MBGD) for ICS intrusion detection. First, to address the issue of rule explosion caused by high-dimensional features, a new modeling approach is proposed that uses reference intervals instead of single values, and the rule generation mode is changed from conjunction to disjunction, further improving the model inference method and effectively solving the combination rule explosion. Second, the large amount of historical data slows down the model optimization process; thus, an optimization method based on minibatch gradient descent is proposed to quickly optimize the parameters in the BRB. Finally, experiments were conducted on natural gas pipeline system and water storage tank system intrusion detection data, and the detection rate reached >90 %, verifying the effectiveness of the model.
引用
收藏
页数:21
相关论文
共 46 条
  • [11] A fault detection method for FADS system based on interval-valued neutrosophic sets, belief rule base, and D-S evidence reasoning
    Jia, Qianlei
    Hu, Jiayue
    Zhang, Weiguo
    [J]. AEROSPACE SCIENCE AND TECHNOLOGY, 2021, 114
  • [12] A novel IoT network intrusion detection approach based on Adaptive Particle Swarm Optimization Convolutional Neural Network
    Kan, Xiu
    Fan, Yixuan
    Fang, Zhijun
    Cao, Le
    Xiong, Neal N.
    Yang, Dan
    Li, Xuan
    [J]. INFORMATION SCIENCES, 2021, 568 : 147 - 162
  • [13] Machine learning methods for cyber security intrusion detection: Datasets and comparative study
    Kilincer, Ilhan Firat
    Ertam, Fatih
    Sengur, Abdulkadir
    [J]. COMPUTER NETWORKS, 2021, 188
  • [14] Belief rule-based inference for predicting trauma outcome
    Kong, Guilan
    Xu, Dong-Ling
    Yang, Jian-Bo
    Yin, Xiaofeng
    Wang, Tianbing
    Jiang, Baoguo
    Hu, Yonghua
    [J]. KNOWLEDGE-BASED SYSTEMS, 2016, 95 : 35 - 44
  • [15] A New Adaptive Interpretable Fault Diagnosis Model for Complex System Based on Belief Rule Base
    Li, Can
    Shen, Qiang
    Wang, Lixin
    Qin, Weiwei
    Xie, Meimei
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2022, 71
  • [16] A novel belief rule base representation, generation and its inference methodology
    Liu, Jun
    Martinez, Luis
    Calzada, Alberto
    Wang, Hui
    [J]. KNOWLEDGE-BASED SYSTEMS, 2013, 53 : 129 - 141
  • [17] DeNNeS: deep embedded neural network expert system for detecting cyber attacks
    Mahdavifar, Samaneh
    Ghorbani, Ali A.
    [J]. NEURAL COMPUTING & APPLICATIONS, 2020, 32 (18) : 14753 - 14780
  • [18] Kalis - A System for Knowledge-driven Adaptable Intrusion Detection for the Internet of Things
    Midi, Daniele
    Rullo, Antonino
    Mudgerikar, Anand
    Bertino, Elisa
    [J]. 2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, : 656 - 666
  • [19] The Whale Optimization Algorithm
    Mirjalili, Seyedali
    Lewis, Andrew
    [J]. ADVANCES IN ENGINEERING SOFTWARE, 2016, 95 : 51 - 67
  • [20] A comprehensive survey and taxonomy of the SVM-based intrusion detection systems
    Mohammadi, Mokhtar
    Rashid, Tarik A.
    Karim, Sarkhel H. Taher
    Aldalwie, Adil Hussain Mohammed
    Quan Thanh Tho
    Bidaki, Moazam
    Rahmani, Amir Masoud
    Hosseinzadeh, Mehdi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 178