One-Dimensional Convolutional Wasserstein Generative Adversarial Network Based Intrusion Detection Method for Industrial Control Systems

被引:4
作者
Cai, Zengyu [1 ]
Du, Hongyu [2 ]
Wang, Haoqi [3 ]
Zhang, Jianwei [4 ]
Si, Yajie [1 ]
Li, Pengrong [1 ]
机构
[1] Zhengzhou Univ Light Ind, Sch Comp & Commun Engn, Zhengzhou 450001, Peoples R China
[2] Xiamen Univ, Sch Informat, Xiamen 361005, Peoples R China
[3] Zhengzhou Univ Light Ind, Sch Mech & Elect Engn, Zhengzhou 430002, Peoples R China
[4] Zhengzhou Univ Light Ind, Sch Software Engn, Zhengzhou 450003, Peoples R China
基金
中国国家自然科学基金;
关键词
intrusion detection; industrial control systems; Wasserstein generative adversarial network;
D O I
10.3390/electronics12224653
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The imbalance between normal and attack samples in the industrial control systems (ICSs) network environment leads to the low recognition rate of the intrusion detection model for a few abnormal samples when classifying. Since traditional machine learning methods can no longer meet the needs of increasingly complex networks, many researchers use deep learning to replace traditional machine learning methods. However, when a large amount of unbalanced data is used for training, the detection performance of deep learning decreases significantly. This paper proposes an intrusion detection method for industrial control systems based on a 1D CWGAN. The 1D CWGAN is a network attack sample generation method that combines 1D CNN and WGAN. Firstly, the problem of low ICS intrusion detection accuracy caused by a few types of attack samples is analyzed. This method balances the number of various attack samples in the data set from the aspect of data enhancement to improve detection accuracy. According to the temporal characteristics of network traffic, the algorithm uses 1D convolution and 1D transposed convolution to construct the modeling framework of network traffic data of two competing networks and uses gradient penalty instead of weight cutting in the Wasserstein Generative Adversarial Network (WGAN) to generate virtual samples similar to real samples. After a large number of data sets are used for verification, the experimental results show that the method improves the classification performance of the CNN and BiSRU. For the CNN, after data balancing, the accuracy rate is increased by 0.75%, and the accuracy, recall rate and F1 are improved. Compared with the BiSRU without data processing, the accuracy of the s1D CWGAN-BiSRU is increased by 1.34%, and the accuracy, recall and F1 are increased by 7.2%, 3.46% and 5.29%.
引用
收藏
页数:17
相关论文
共 27 条
[1]   On Using Physical Based Intrusion Detection in SCADA Systems [J].
Al-Asiri, Majed ;
El-Alfy, El-Sayed M. .
11TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 3RD INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS, 2020, 170 :34-42
[2]   Enhancing the Sustainability of Deep-Learning-Based Network Intrusion Detection Classifiers against Adversarial Attacks [J].
Alotaibi, Afnan ;
Rassam, Murad A. .
SUSTAINABILITY, 2023, 15 (12)
[3]  
Altunay H.C., 2021, P 2021 3 INT C HUM F, P1
[4]   Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests [J].
Anton, Simon D. Duque ;
Sinha, Sapna ;
Schotten, Hans Dieter .
2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2019, :465-470
[5]   The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems [J].
Balla, Asaad ;
Habaebi, Mohamed Hadi ;
Elsheikh, Elfatih A. A. ;
Islam, Md. Rafiqul ;
Suliman, F. M. .
SENSORS, 2023, 23 (02)
[6]   Efficient BiSRU Combined With Feature Dimensionality Reduction for Abnormal Traffic Detection [J].
Ding, Pengpeng ;
Li, Jinguo ;
Wen, Mi ;
Wang, Liangliang ;
Li, Hongjiao .
IEEE ACCESS, 2020, 8 :164414-164427
[7]  
Du P.H., 2024, Comput. Secur, V136, P103567
[8]  
Huan Yang, 2019, 2019 IEEE Conference on Communications and Network Security (CNS), DOI 10.1109/CNS.2019.8802785
[9]   A New Data-Balancing Approach Based on Generative Adversarial Network for Network Intrusion Detection System [J].
Jamoos, Mohammad ;
Mora, Antonio M. ;
AlKhanafseh, Mohammad ;
Surakhi, Ola .
ELECTRONICS, 2023, 12 (13)
[10]  
Khan A. A. Z., 2019, P INT C SEC MAN, P84