Assessment of Network Security Situation of Industrial Control System Based on CG-ELM

被引:0
作者
Quan, Hengzhi [1 ]
Zhang, Ji [2 ]
Sun, Yining [1 ]
Bu, Fan [1 ]
Chen, Xinwei [1 ]
机构
[1] China State Shipbldg Corp, Syst Engn Res Inst, Beijing 100094, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Elect Engn & Automat, Qingdao 266590, Peoples R China
来源
2023 2ND CONFERENCE ON FULLY ACTUATED SYSTEM THEORY AND APPLICATIONS, CFASTA | 2023年
关键词
Industrial control system; Network security; Situation awareness; CG-ELM;
D O I
10.1109/CFASTA57821.2023.10243231
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a network security situation assessment model of the industrial control system, and the model divides the industrial control network security situation assessment into two subtasks: threat traffic detection and determination of hierarchical weight. The purpose of threat traffic detection is to detect possible network attacks in network data traffic. In order to identify network attacks quickly and accurately, this paper uses the extreme learning machine model to classify network attacks, and uses the conjugate gradient method to improve the training efficiency of the extreme learning machine model. For the purpose of assessing the impact of different network attacks on the security situation of industrial control systems, this paper proposes a hierarchical industrial control network model for situation assessment based on the Analytic Hierarchy Process. The experimental verification of the situation assessment is carried out on the simulation platform of the sewage treatment industrial control system.
引用
收藏
页码:925 / 930
页数:6
相关论文
共 11 条
  • [1] Intrusion detection systems and multisensor data fusion
    Bass, T
    [J]. COMMUNICATIONS OF THE ACM, 2000, 43 (04) : 99 - 105
  • [2] Du J., 2019, Master's thesis
  • [3] Endsley M.R., 1988, HUM FACT SOC 32 ANN, V32, P97, DOI DOI 10.1177/154193128803200221
  • [4] TOWARD A THEORY OF SITUATION AWARENESS IN DYNAMIC-SYSTEMS
    ENDSLEY, MR
    [J]. HUMAN FACTORS, 1995, 37 (01) : 32 - 64
  • [5] Gao JL, 2018, CHIN CONTR CONF, P5961, DOI 10.23919/ChiCC.2018.8483314
  • [6] Han X., 2019, Information Security and Communication Privacy, P61
  • [7] Extreme learning machine: Theory and applications
    Huang, Guang-Bin
    Zhu, Qin-Yu
    Siew, Chee-Kheong
    [J]. NEUROCOMPUTING, 2006, 70 (1-3) : 489 - 501
  • [8] The Cybersecurity Landscape in Industrial Control Systems
    McLaughlin, Stephen
    Konstantinou, Charalambos
    Wang, Xueyang
    Davi, Lucas
    Sadeghi, Ahmad-Reza
    Maniatakos, Michail
    Karri, Ramesh
    [J]. PROCEEDINGS OF THE IEEE, 2016, 104 (05) : 1039 - 1057
  • [9] Shi C., 2020, Master's thesis
  • [10] Weiss, 2016, OR Insight, V19, P33