An Intelligent Approach for Intrusion Detection in Industrial Control System

被引:0
作者
Alkhalil, Adel [1 ]
Aljaloud, Abdulaziz [1 ]
Uliyan, Diaa [1 ]
Altameemi, Mohammed [1 ]
Abdelrhman, Magdy [2 ,3 ]
Altameemi, Yaser [4 ]
Ahmad, Aakash [5 ]
Mansour, Romany Fouad [6 ]
机构
[1] Univ Hail, Coll Comp Sci & Engn, Dept Informat & Comp Sci, Hail 81481, Saudi Arabia
[2] Univ Hail, Appl Coll, Hail 81481, Saudi Arabia
[3] New Valley Univ, Coll Educ, El Kharga 72511, Egypt
[4] Univ Hail, Coll Art, Hail 16286, Saudi Arabia
[5] Lancaster Univ Leipzig, Sch Comp & Commun, D-04109 Leipzig, Germany
[6] New Valley Univ, Coll Sci, El Kharga 72511, Egypt
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 77卷 / 02期
关键词
Industrial control system; anomaly detection; intrusion detection; system protection;
D O I
10.32604/cmc.2023.044506
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervisory control and data acquisition (SCADA) systems are computer systems that gather and analyze real-time data, distributed control systems are specially designed automated control system that consists of geographically distributed control elements, and other smaller control systems such as programmable logic controllers are industrial solid-state computers that monitor inputs and outputs and make logic-based decisions. In recent years, there has been a lot of focus on the security of industrial control systems. Due to the advancement in information technologies, the risk of cyberattacks on industrial control system has been drastically increased. Because they are so inextricably tied to human life, any damage to them might have devastating consequences. To provide an efficient solution to such problems, this paper proposes a new approach to intrusion detection. First, the important features in the dataset are determined by the difference between the distribution of unlabeled and positive data which is deployed for the learning process. Then, a prior estimation of the class is proposed based on a support vector machine. Simulation results show that the proposed approach has better anomaly detection performance than existing algorithms.
引用
收藏
页码:2049 / 2078
页数:30
相关论文
共 53 条
[1]   Cyber Physical Security Analytics for Anomalies in Transmission Protection Systems [J].
Ahmed, Arman ;
Krishnan, Vignesh V. G. ;
Foroutan, Seyedeh Armina ;
Touhiduzzaman, Md. ;
Rublein, Caroline ;
Srivastava, Anurag ;
Wu, Yinghui ;
Hahn, Adam ;
Suresh, Sindhu .
IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, 2019, 55 (06) :6313-6323
[2]  
Ahmed CM, 2017, P 3 INT WORKSH CYB P, P25, DOI [10.1145/3055366.3055375, DOI 10.1145/3055366.3055375]
[3]  
[Anonymous], DNP3 Intrusion Detection Dataset
[4]  
[Anonymous], IEC 60870-5-104 Intrusion Detection Dataset
[5]   Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection [J].
Ayo, Femi Emmanuel ;
Folorunso, Sakinat Oluwabukonla ;
Abayomi-Alli, Adebayo A. ;
Adekunle, Adebola Olayinka ;
Awotunde, Joseph Bamidele .
INFORMATION SECURITY JOURNAL, 2020, 29 (06) :267-283
[6]   Convex formulation of multiple instance learning from positive and unlabeled bags [J].
Bao, Han ;
Sakai, Tomoya ;
Sato, Issei ;
Sugiyama, Masashi .
NEURAL NETWORKS, 2018, 105 :132-141
[7]   Learning from positive and unlabeled data: a survey [J].
Bekker, Jessa ;
Davis, Jesse .
MACHINE LEARNING, 2020, 109 (04) :719-760
[8]  
Butun I., 2015, Sensors, V15, P1
[9]  
Chu Y., 2019, Security and Communication Networks, V19, P1
[10]  
dnp, About us