Symmetrical Resilience: Detection of Cyberattacks for SCADA Systems Used in IIoT in Big Data Environments

被引:0
作者
Okur, Celil [1 ]
Dener, Murat [1 ]
机构
[1] Gazi Univ, Grad Sch Nat & Appl Sci, Informat Secur Engn, TR-06560 Ankara, Turkiye
来源
SYMMETRY-BASEL | 2025年 / 17卷 / 04期
关键词
big data; machine learning; deep learning; SCADA security; IIoT security; attack detection; anomaly detection; cybersecurity; HYBRID INTRUSION DETECTION; MACHINE;
D O I
10.3390/sym17040480
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In recent years, Internet of Things (IoT) systems are used in Industrial Internet of Things (IIoT) systems due to their widespread use in industrial sectors, providing convenience to users in SCADA systems, like other domains. In addition to the diverse technological advancements discussed, the inherent symmetry within the network structures of SCADA systems utilized in the IIoT echoes a fundamental balance sought in digital frameworks. However, along with the advantages of IIoT systems, there are also disadvantages, one major drawback being their vulnerability to attacks. It has been observed that advanced methods such as artificial intelligence, unlike traditional detection techniques, are more successful at detecting attacks on IIoT systems used in SCADA systems. The proposed model was developed to detect cyberattacks on SCADA systems using machine learning and deep learning models. The SCADA network traffic consists of over 7 million rows and has a size of 627 MB. Attack network traffic refers to the type of traffic aimed at causing damage to the system. The attack traffic in this study includes five different attacks. Normal traffic is the type of traffic that facilitates the system's usual communication. Prepared network traffic is not a different type of traffic. Prepared network traffic, as named, is the state of the traffic dataset that has been made ready for analysis with models. The prepared network traffic was examined using eight machine learning models, including the CART, Decision Tree, KNN, Logistic Regression, Naive Bayes, Random Forest, SVM, and XGBoost models, as well as seven deep learning models, namely, CNN, GRU, LSTM, MLP, RNN, CNN-LSTM, and LSTM-CNN. During the evaluation of the models, performance parameters such as the accuracy, F-score, precision, and recall were considered, and the results are presented accordingly. Upon examining the dataset with various models, the highest outcomes were achieved using the MLP model. The investigation utilizing the MLP model resulted in an accuracy of 99.95%, a precision of 99.63%, a recall of 99.49%, and an F-score of 99.56%. These values were obtained with a batch-size combination of 100 and 20 epochs. By addressing cyberattack detection in SCADA systems used in the IIoT within a big data environment, the study encompasses a multidisciplinary approach, touching upon cybersecurity, big data analytics, AI, information security, and IoT-related concerns, all of which are focal points within the scope of the journal. This breadth and depth of coverage make the study highly relevant and aligned with the diverse interests of the journal.
引用
收藏
页数:28
相关论文
共 43 条
  • [1] A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT
    Aboelwafa, Mariam M. N.
    Seddik, Karim G.
    Eldefrawy, Mohamed H.
    Gadallah, Yasser
    Gidlund, Mikael
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09): : 8462 - 8471
  • [2] Identification of malicious activities in industrial internet of things based on deep learning models
    AL-Hawawreh, Muna
    Moustafa, Nour
    Sitnikova, Elena
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 1 - 11
  • [3] Detection of interruption attack in the wireless networked closed loop industrial control systems
    Benisha, R. B.
    Raja Ratna, S.
    [J]. TELECOMMUNICATION SYSTEMS, 2020, 73 (03) : 359 - 370
  • [4] Binnar Pranita, 2024, Cyber Security and Applications, V2, DOI 10.1016/j.csa.2023.100034
  • [5] Blyth A., 2022, P IEEE INT C CYB SEC, P1
  • [6] The industrial internet of things (IIoT): An analysis framework
    Boyes, Hugh
    Hallaq, Bit
    Cunningham, Joe
    Watson, Tim
    [J]. COMPUTERS IN INDUSTRY, 2018, 101 : 1 - 12
  • [7] Random forests
    Breiman, L
    [J]. MACHINE LEARNING, 2001, 45 (01) : 5 - 32
  • [8] Chen L., 2021, IEEE Access, V9, P62036
  • [9] A Weighted Machine Learning-Based Attacks Classification to Alleviating Class Imbalance
    Chkirbene, Zina
    Erbad, Aiman
    Hamila, Ridha
    Gouissem, Ala
    Mohamed, Amr
    Guizani, Mohsen
    Hamdi, Mounir
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (04): : 4780 - 4791
  • [10] A Stacked Ensemble Classifier for an Intrusion Detection System in the Edge of IoT and IIoT Networks
    da Silva Oliveira, Giovanni Aparecido
    Silva Lima, Priscila Serra
    Kon, Fabio
    Terada, Routo
    Batista, Daniel MaceDo
    Hirata, Roberto
    Hamdan, Mosab
    [J]. 2022 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM), 2022,