Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System

被引:15
作者
Alzahrani, Ali [1 ]
Aldhyani, Theyazn H. H. [2 ]
机构
[1] King Faisal Univ, Dept Comp Engn, POB 400, Al Hufuf 31982, Saudi Arabia
[2] King Faisal Univ, Appl Coll Abqaiq, POB 400, Al Hufuf 31982, Saudi Arabia
关键词
intrusion detection system; industrial control systems; deep learning; cybersecurity; INTRUSION DETECTION; ACCESS-CONTROL; NETWORK; INTERNET; MODEL;
D O I
10.3390/su15108076
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Online food security and industrial environments and sustainability-related industries are highly confidential and in urgent need for network traffic analysis to attain proper security information to avoid attacks from anywhere in the world. The integration of cutting-edge technology such as the Internet of things (IoT) has resulted in a gradual increase in the number of vulnerabilities that may be exploited in supervisory control and data acquisition (SCADA) systems. In this research, we present a network intrusion detection system for SCADA networks that is based on deep learning. The goal of this system is to defend ICSs against network-based assaults that are both conventional and SCADA-specific. An empirical evaluation of a number of classification techniques including k-nearest neighbors (KNN), linear discriminant analysis (LDA), random forest (RF), convolution neural network (CNN), and integrated gated recurrent unit (GRU) is reported in this paper. The suggested algorithms were tested on a genuine industrial control system (SCADA), which was known as the WUSTL-IIoT-2018 and WUSTL-IIoT-20121 datasets. SCADA system operators are now able to augment proposed machine learning and deep learning models with site-specific network attack traces as a result of our invention of a re-training method to handle previously unforeseen instances of network attacks. The empirical results, using realistic SCADA traffic datasets, show that the proposed machine learning and deep-learning-based approach is well-suited for network intrusion detection in SCADA systems, achieving high detection accuracy and providing the capability to handle newly emerging threats. The accuracy performance attained by the KNN and RF algorithms was superior and achieved a near-perfect score of 99.99%, whereas the CNN-GRU model scored an accuracy of 99.98% using WUSTL-IIoT-2018. The Rf and GRU algorithms achieved >99.75% using the WUSTL-IIoT-20121 dataset. In addition, a statistical analysis method was developed in order to anticipate the error that exists between the target values and the prediction values. According to the findings of the statistical analysis, the KNN, RF, and CNN-GRU approaches were successful in achieving an R-2 > 99%. This was demonstrated by the fact that the approach was able to handle previously unknown threats in the industrial control systems (ICSs) environment.
引用
收藏
页数:29
相关论文
共 68 条
[1]   Real-Time Identification of Cyber-Physical Attacks on Water Distribution Systems via Machine Learning-Based Anomaly Detection Techniques [J].
Abokifa, Ahmed A. ;
Haddad, Kelsey ;
Lo, Cynthia ;
Biswas, Pratim .
JOURNAL OF WATER RESOURCES PLANNING AND MANAGEMENT, 2019, 145 (01)
[2]   SCADA intrusion detection scheme exploiting the fusion of modified decision tree and Chi-square feature selection [J].
Ahakonye, Love Allen Chijioke ;
Nwakanma, Cosmas Ifeanyi ;
Lee, Jae-Min ;
Kim, Dong-Seong .
INTERNET OF THINGS, 2023, 21
[3]   IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method [J].
Albulayhi, Khalid ;
Abu Al-Haija, Qasem ;
Alsuhibany, Suliman A. ;
Jillepalli, Ananth A. ;
Ashrafuzzaman, Mohammad ;
Sheldon, Frederick T. .
APPLIED SCIENCES-BASEL, 2022, 12 (10)
[4]   Cyber Security for Detecting Distributed Denial of Service Attacks in Agriculture 4.0: Deep Learning Model [J].
Aldhyani, Theyazn H. H. ;
Alkahtani, Hasan .
MATHEMATICS, 2023, 11 (01)
[5]   Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity [J].
Aldhyani, Theyazn H. H. ;
Alkahtani, Hasan .
SENSORS, 2022, 22 (01)
[6]   A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification [J].
Alimi, Oyeniyi Akeem ;
Ouahada, Khmaies ;
Abu-Mahfouz, Adnan M. ;
Rimer, Suvendi ;
Alimi, Kuburat Oyeranti Adefemi .
SUSTAINABILITY, 2021, 13 (17)
[7]   Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems [J].
Alkahtani, Hasan ;
Aldhyani, Theyazn H. H. .
ELECTRONICS, 2022, 11 (11)
[8]   Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices [J].
Alkahtani, Hasan ;
Aldhyani, Theyazn H. H. .
SENSORS, 2022, 22 (06)
[9]   Performance Investigation of Principal Component Analysis for Intrusion Detection System Using Different Support Vector Machine Kernels [J].
Almaiah, Mohammed Amin ;
Almomani, Omar ;
Alsaaidah, Adeeb ;
Al-Otaibi, Shaha ;
Bani-Hani, Nabeel ;
Al Hwaitat, Ahmad K. ;
Al-Zahrani, Ali ;
Lutfi, Abdalwali ;
Awad, Ali Bani ;
Aldhyani, Theyazn H. H. .
ELECTRONICS, 2022, 11 (21)
[10]   An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems [J].
Almalawi, Abdulmohsen ;
Yu, Xinghuo ;
Tari, Zahir ;
Fahad, Adil ;
Khalil, Ibrahim .
COMPUTERS & SECURITY, 2014, 46 :94-110