RRCNN: Request Response-Based Convolutional Neural Network for ICS Network Traffic Anomaly Detection

被引:1
作者
Du, Yan [1 ,2 ]
Zhang, Shibin [1 ,2 ]
Wan, Guogen [1 ,2 ]
Zhou, Daohua [3 ]
Lu, Jiazhong [1 ,2 ]
Huang, Yuanyuan [1 ,2 ]
Cheng, Xiaoman [4 ]
Zhang, Yi [4 ]
He, Peilin [5 ]
机构
[1] Chengdu Univ Informat Technol, Country Sch Cybersecur, Chengdu 610225, Peoples R China
[2] Adv Cryptog & Syst Secur Key Lab Sichuan Prov, Chengdu 610225, Peoples R China
[3] DAQSOFT CO LTD, Chengdu 610213, Peoples R China
[4] Petro China Southwest Oil & Gas Co, Commun & Informat Technol Ctr, Chengdu 610057, Peoples R China
[5] Univ Pittsburgh, Sch Comp & Informat, Pittsburgh, PA USA
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 75卷 / 03期
基金
中国国家自然科学基金;
关键词
Industrial control system (ICS); dataset; network traffic; anomaly detection; INTRUSION DETECTION; INDUSTRIAL; SECURITY;
D O I
10.32604/cmc.2023.035919
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, industrial control system (ICS) has begun to integrate with the Internet. While the Internet has brought convenience to ICS, it has also brought severe security concerns. Traditional ICS network traffic anomaly detection methods rely on statistical features manually extracted using the experience of network security experts. They are not aimed at the original network data, nor can they capture the potential characteristics of network packets. Therefore, the following improvements were made in this study: (1) A dataset that can be used to evaluate anomaly detection algorithms is produced, which provides raw network data. (2) A request response-based convolutional neural network named RRCNN is proposed, which can be used for anomaly detection of ICS network traffic. Instead of using statistical features manually extracted by security experts, this method uses the byte sequences of the original network packets directly, which can extract potential features of the network packets in greater depth. It regards the request packet and response packet in a session as a Request-Response Pair (RRP). The feature of RRP is extracted using a one-dimensional convolutional neural network, and then the RRP is judged to be normal or abnormal based on the extracted feature. Experimental results demonstrate that this model is better than several other machine learning and neural network models, with F1, accuracy, precision, and recall above 99%.
引用
收藏
页码:5743 / 5759
页数:17
相关论文
共 50 条
[21]   Device Performance Anomaly Detection Method Based on Graph Convolutional Neural Network [J].
Liu, Aolun ;
Yang, Yang ;
Guo, Yanpeng ;
Gao, Zhipeng ;
Rui, Lanlan .
PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL II, CENET 2023, 2024, 1126 :230-239
[22]   Network Anomaly Detection based on Traffic Prediction [J].
Wang, Fengyu ;
Gong, Bin ;
Hu, Yi ;
Zhang, Ningbo .
2009 INTERNATIONAL CONFERENCE ON SCALABLE COMPUTING AND COMMUNICATIONS & EIGHTH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING, 2009, :449-454
[23]   Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network [J].
Lai, Yingxu ;
Zhang, Jingwen ;
Liu, Zenghui .
SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
[24]   Sensor Data Based Anomaly Detection in Autonomous Vehicles using Modified Convolutional Neural Network [J].
Rajendar, Sivaramakrishnan ;
Kaliappan, Vishnu Kumar .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (02) :859-875
[25]   Convolutional Neural Network with Character Embeddings for Malicious Web Request Detection [J].
Wu, Jiahong ;
Yang, Zhenguo ;
Guo, Lingni ;
Li, Yong ;
Liu, Wenyin .
2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, :622-627
[26]   Network anomaly detection using channel boosted and residual learning based deep convolutional neural network [J].
Chouhan, Naveed ;
Khan, Asifullah ;
Khan, Haroon-ur-Rasheed .
APPLIED SOFT COMPUTING, 2019, 83
[27]   Convolutional Neural Network Analysis of Recurrence Plots for Anomaly Detection [J].
Chen, Yun ;
Su, Shijie ;
Yang, Hui .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2020, 30 (01)
[28]   Anomaly detection in network traffic [J].
Duraj, Agnieszka ;
Bucki, Pawel ;
Drajling, Aleksander ;
Makrocki, Robert ;
Sipinski, Mateusz .
PRZEGLAD ELEKTROTECHNICZNY, 2022, 98 (12) :205-208
[29]   Application in Anomaly Detection of Network Traffic Based on Fractal Technology [J].
He, Yuemei ;
Wang, Baomin ;
Qiao, Dejun .
MECHANICAL ENGINEERING AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2012, 195-196 :987-991
[30]   Network traffic anomaly detection based on deep learning: a review [J].
Zhang, Wenjing ;
Lei, Xuemei .
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2024, 27 (03) :249-257