The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems

被引:30
作者
Balla, Asaad [1 ]
Habaebi, Mohamed Hadi [1 ]
Elsheikh, Elfatih A. A. [2 ]
Islam, Md. Rafiqul [1 ]
Suliman, F. M. [2 ]
机构
[1] Int Islamic Univ Malaysia, Dept Elect & Comp Engn, Kuala Lumpur 53100, Malaysia
[2] King Khalid Univ, Coll Engn, Dept Elect Engn, Abha 61421, Saudi Arabia
关键词
IDS; ICS; SCADA; imbalanced datasets; cyber security;
D O I
10.3390/s23020758
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Integrating IoT devices in SCADA systems has provided efficient and improved data collection and transmission technologies. This enhancement comes with significant security challenges, exposing traditionally isolated systems to the public internet. Effective and highly reliable security devices, such as intrusion detection system (IDSs) and intrusion prevention systems (IPS), are critical. Countless studies used deep learning algorithms to design an efficient IDS; however, the fundamental issue of imbalanced datasets was not fully addressed. In our research, we examined the impact of data imbalance on developing an effective SCADA-based IDS. To investigate the impact of various data balancing techniques, we chose two unbalanced datasets, the Morris power dataset, and CICIDS2017 dataset, including random sampling, one-sided selection (OSS), near-miss, SMOTE, and ADASYN. For binary classification, convolutional neural networks were coupled with long short-term memory (CNN-LSTM). The system's effectiveness was determined by the confusion matrix, which includes evaluation metrics, such as accuracy, precision, detection rate, and F1-score. Four experiments on the two datasets demonstrate the impact of the data imbalance. This research aims to help security researchers in understanding imbalanced datasets and their impact on DL SCADA-IDS.
引用
收藏
页数:12
相关论文
共 16 条
[1]  
Abdulrahman A. A., 2020, Samarra J. Pure Appl. Sci, V2, P132, DOI DOI 10.54153/SJPAS.2020.V2I3.86
[2]  
[Anonymous], EFFECT IMBALANCED DA
[3]  
[Anonymous], 2019, P COMM COMP INF SCI, DOI DOI 10.1007/978-3-030-25109-3_9
[4]  
Aziz MN, 2021, J ENG SCI TECHNOL, V16, P1342
[5]  
Fundin A., 2021, THESIS LINKOPING U L
[6]   Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks [J].
Huda, Shamsul ;
Yearwood, John ;
Hassan, Mohammad Mehedi ;
Almogren, Ahmad .
APPLIED SOFT COMPUTING, 2018, 71 :66-77
[7]   Network Intrusion Detection Combined Hybrid Sampling With Deep Hierarchical Network [J].
Jiang, Kaiyuan ;
Wang, Wenya ;
Wang, Aili ;
Wu, Haibin .
IEEE ACCESS, 2020, 8 :32464-32476
[8]  
Kulkarni A, 2020, DATA DEMOCRACY: AT THE NEXUS OF ARTIFICIAL INTELLIGENCE, SOFTWARE DEVELOPMENT, AND KNOWLEDGE ENGINEERING, P83, DOI 10.1016/B978-0-12-818366-3.00005-8
[9]  
Miah M.O., 2019, 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), IEEE, P1, DOI DOI 10.1109/ICASERT.2019.8934495
[10]   A Review and Analysis of the Bot-IoT Dataset [J].
Peterson, Jared M. ;
Leevy, Joffrey L. ;
Khoshgoftaar, Taghi M. .
2021 15TH IEEE INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2021), 2021, :20-27