Multi-step attack detection in industrial networks using a hybrid deep learning architecture

被引:4
作者
Jamal, Muhammad Hassan [1 ]
Khan, Muazzam A. [1 ,2 ]
Ullah, Safi [1 ]
Alshehri, Mohammed S. [3 ]
Almakdi, Sultan [3 ]
Rashid, Umer [1 ]
Alazeb, Abdulwahab [3 ]
Ahmad, Jawad [4 ]
机构
[1] Quaid i Azam Univ, Dept Comp Sci, Islamabad 45320, Pakistan
[2] Quaid i Azam Univ, ICESCO Chair Big Data Analyt & Edge Comp, Islamabad 45320, Pakistan
[3] Najran Univ, Coll Comp Sci & Informat Syst, Dept Comp Sci, Najran 61441, Saudi Arabia
[4] Edinburgh Napier Univ, Sch Comp Engn & Built Environm, Edinburgh EH10 5DT, Scotland
关键词
INTRUSION DETECTION;
D O I
10.3934/mbe.2023615
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
In recent years, the industrial network has seen a number of high-impact attacks. To counter these threats, several security systems have been implemented to detect attacks on industrial networks. However, these systems solely address issues once they have already transpired and do not proactively prevent them from occurring in the first place. The identification of malicious attacks is crucial for industrial networks, as these attacks can lead to system malfunctions, network disruptions, data corruption, and the theft of sensitive information. To ensure the effectiveness of detection in industrial networks, which necessitate continuous operation and undergo changes over time, intrusion detection algorithms should possess the capability to automatically adapt to these changes. Several researchers have focused on the automatic detection of these attacks, in which deep learning (DL) and machine learning algorithms play a prominent role. This study proposes a hybrid model that combines two DL algorithms, namely convolutional neural networks (CNN) and deep belief networks (DBN), for intrusion detection in industrial networks. To evaluate the effectiveness of the proposed model, we utilized the Multi-Step Cyber Attack (MSCAD) dataset and employed various evaluation metrics.
引用
收藏
页码:13824 / 13848
页数:25
相关论文
共 69 条
  • [1] Real-Time Detection System for Data Exfiltration over DNS Tunneling Using Machine Learning
    Abualghanam, Orieb
    Alazzam, Hadeel
    Elshqeirat, Basima
    Qatawneh, Mohammad
    Almaiah, Mohammed Amin
    [J]. ELECTRONICS, 2023, 12 (06)
  • [2] Agrawal S, 2021, Arxiv, DOI [arXiv:2106.09527, DOI 10.48550/ARXIV.2106.09527]
  • [3] Albawi S, 2017, I C ENG TECHNOL
  • [4] Alheeti Khattab M. Ali, 2023, 2023 15th International Conference on Developments in eSystems Engineering (DeSE), P510, DOI 10.1109/DeSE58274.2023.10100226
  • [5] An Accurate Detection Approach for IoT Botnet Attacks Using Interpolation Reasoning Method
    Almseidin, Mohammad
    Alkasassbeh, Mouhammd
    [J]. INFORMATION, 2022, 13 (06)
  • [6] Generating a benchmark cyber multi-step attacks dataset for intrusion detection
    Almseidin, Mohammad
    Al-Sawwa, Jamil
    Alkasassbeh, Mouhammd
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 43 (03) : 3679 - 3694
  • [7] Angseus J., 2017, THESIS U GOTHENBURG
  • [8] Axelsson B., 1992, IND NETWORKS ROUTLED
  • [9] Azizjon Meliboev, 2020, 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), P218, DOI 10.1109/ICAIIC48513.2020.9064976
  • [10] Baezner M., 2017, Stuxnet