A Diffusion Model Based on Network Intrusion Detection Method for Industrial Cyber-Physical Systems

被引:9
作者
Tang, Bin [1 ,2 ]
Lu, Yan [3 ]
Li, Qi [3 ]
Bai, Yueying [3 ]
Yu, Jie [3 ]
Yu, Xu [3 ,4 ]
机构
[1] Harbin Engn Univ, Qingdao Innovat & Dev Base, Qingdao 266000, Peoples R China
[2] Harbin Engn Univ, Ship Sci & Technol Co Ltd, Qingdao 266000, Peoples R China
[3] Qingdao Univ Sci & Technol, Coll Informat Sci & Technol, Qingdao 266000, Peoples R China
[4] Jilin Univ, Minist Educ, Key Lab Symbol Computat & Knowledge Engn, Changchun 130000, Peoples R China
基金
中国国家自然科学基金;
关键词
diffusion model; intrusion detection; ICPS; imbalanced data; BiLSTM;
D O I
10.3390/s23031141
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Industrial Cyber-Physical Systems (ICPS) connect intelligent manufacturing equipment equipped with sensors, wireless and RFID communication technologies through data interaction, which makes the interior of the factory, even between factories, become a whole. However, intelligent factories will suffer information leakage and equipment damage when being attacked by ICPS intrusion. Therefore, the network security of ICPS cannot be ignored, and researchers have conducted in-depth research on network intrusion detection for ICPS. Though machine learning and deep learning methods are often used for network intrusion detection, the problem of data imbalance can cause the model to pay attention to the misclassification cost of the prevalent class, but ignore that of the rare class, which seriously affects the classification performance of network intrusion detection models. Considering the powerful generative power of the diffusion model, we propose an ICPS Intrusion Detection system based on the Diffusion model (IDD). Firstly, data corresponding to the rare class is generated by the diffusion model, which makes the training dataset of different classes balanced. Then, the improved BiLSTM classification network is trained on the balanced training set. Extensive experiments are conducted to show that the IDD method outperforms the existing baseline method on several available datasets.
引用
收藏
页数:15
相关论文
共 42 条
  • [1] Abolhasanzadeh B., 2015, 2015 7th Conference on Information and Knowledge Technology (IKT), P1, DOI [DOI 10.1109/IKT.2015.7288799, 10.1109/IKT.2015.7288799]
  • [2] Survey on Anomaly Detection using Data Mining Techniques
    Agrawal, Shikha
    Agrawal, Jitendra
    [J]. KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 : 708 - 713
  • [3] Alom MZ, 2017, PROC NAECON IEEE NAT, P63, DOI 10.1109/NAECON.2017.8268746
  • [4] Alom MZ, 2015, PROC NAECON IEEE NAT, P339, DOI 10.1109/NAECON.2015.7443094
  • [5] Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning
    Aminanto, Muhamad Erza
    Kim, Kwangjo
    [J]. INFORMATION SECURITY APPLICATIONS, 2018, 10763 : 212 - 223
  • [6] Anani W, 2018, CAN CON EL COMP EN
  • [7] Austin J, 2021, ADV NEUR IN
  • [8] Batzolis G, 2021, Arxiv, DOI arXiv:2111.13606
  • [9] An empirical comparison on state-of-the-art multi-class imbalance learning algorithms and a new diversified ensemble learning scheme
    Bi, Jingjun
    Zhang, Chongsheng
    [J]. KNOWLEDGE-BASED SYSTEMS, 2018, 158 : 81 - 93
  • [10] A Survey of Intrusion Detection Systems in Wireless Sensor Networks
    Butun, Ismail
    Morgera, Salvatore D.
    Sankar, Ravi
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) : 266 - 282