Machine Learning Algorithms for Identifying Dependencies in OT Protocols

被引:0
作者
Smolarczyk, Milosz [1 ]
Pawluk, Jakub [2 ]
Kotyla, Alicja [2 ]
Plamowski, Sebastian [3 ]
Kaminska, Katarzyna [2 ,4 ]
Szczypiorski, Krzysztof [2 ,4 ]
机构
[1] Cryptomage LLC, Res & Dev Dept, St Petersburg, FL 33702 USA
[2] Cryptomage SA, Res & Dev Dept, PL-50556 Wroclaw, Poland
[3] Warsaw Univ Technol, Inst Control & Computat Engn, PL-00661 Warsaw, Poland
[4] Warsaw Univ Technol, Inst Telecommun, PL-00661 Warsaw, Poland
关键词
cybersecurity; machine learning; XGBoost; EBM; GAM; Modbus TCP/IP;
D O I
10.3390/en16104056
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
This study illustrates the utility and effectiveness of machine learning algorithms in identifying dependencies in data transmitted in industrial networks. The analysis was performed for two different algorithms. The study was carried out for the XGBoost (Extreme Gradient Boosting) algorithm based on a set of decision tree model classifiers, and the second algorithm tested was the EBM (Explainable Boosting Machines), which belongs to the class of Generalized Additive Models (GAM). Tests were conducted for several test scenarios. Simulated data from static equations were used, as were data from a simulator described by dynamic differential equations, and the final one used data from an actual physical laboratory bench connected via Modbus TCP/IP. Experimental results of both techniques are presented, thus demonstrating the effectiveness of the algorithms. The results show the strength of the algorithms studied, especially against static data. For dynamic data, the results are worse, but still at a level that allows using the researched methods to identify dependencies. The algorithms presented in this paper were used as a passive protection layer of a commercial IDS (Intrusion Detection System).
引用
收藏
页数:24
相关论文
共 43 条
  • [1] Comparison of Random Forest and Support Vector Machine Classifiers for Regional Land Cover Mapping Using Coarse Resolution FY-3C Images
    Adugna, Tesfaye
    Xu, Wenbo
    Fan, Jinlong
    [J]. REMOTE SENSING, 2022, 14 (03)
  • [2] Apply machine learning techniques to detect malicious network traffic in cloud computing
    Alshammari, Amirah
    Aldribi, Abdulaziz
    [J]. JOURNAL OF BIG DATA, 2021, 8 (01)
  • [3] Reshoring and industry 4.0: How often do they go together?
    Ancarani A.
    Di Mauro C.
    [J]. IEEE Engineering Management Review, 2018, 46 (02): : 87 - 96
  • [4] [Anonymous], 2015, SLAMMER WORM DAVID B
  • [5] [Anonymous], 2007, ISA990001 ISA AM NA
  • [6] [Anonymous], 2014, IND CONTROL SYST
  • [7] [Anonymous], 2015, 80082 SP NAT I STAND
  • [8] Stuxnet, the Real Start of Cyber Warfare?
    Chen, Thomas M.
    [J]. IEEE NETWORK, 2010, 24 (06): : 2 - 3
  • [9] XGBoost: A Scalable Tree Boosting System
    Chen, Tianqi
    Guestrin, Carlos
    [J]. KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, : 785 - 794
  • [10] Comparison of Support Vector Machines and Random Forests for Corine Land Cover Mapping
    Dabija, Anca
    Kluczek, Marcin
    Zagajewski, Bogdan
    Raczko, Edwin
    Kycko, Marlena
    Al-Sulttani, Ahmed H.
    Tarda, Anna
    Pineda, Lydia
    Corbera, Jordi
    [J]. REMOTE SENSING, 2021, 13 (04) : 1 - 35