A Hybrid Model for Anomaly-based Intrusion Detection in SCADA Networks

被引:0
作者
Ullah, Imtiaz [1 ]
Mahmoud, Qusay H. [1 ]
机构
[1] Univ Ontario, Inst Technol, Dept Elect Comp & Software Engn, Oshawa, ON L1H 7K4, Canada
来源
2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA) | 2017年
关键词
SCADA systems; industrial control system; machine learning; intrusion detection; cybersecurity; vulnerabilities; SYSTEM;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Supervisory Control and Data Acquisition (SCADA) systems complexity and interconnectivity increase in recent years have exposed the SCADA networks to numerous potential vulnerabilities. Several studies have shown that anomaly-based Intrusion Detection Systems (IDS) achieves improved performance to identify unknown or zero-day attacks. In this paper, we propose a hybrid model for anomaly-based intrusion detection in SCADA networks using machine learning approach. In the first part, we present a robust hybrid model for anomaly-based intrusion detection in SCADA networks. Finally, we present a feature selection model for anomaly-based intrusion detection in SCADA networks by removing redundant and irrelevant features. Irrelevant features in the dataset can affect modeling power and reduce predictive accuracy. These models were evaluated using an industrial control system dataset developed at the Distributed Analytics and Security Institute Mississippi State University Starkville, MS, USA. The experimental results show that our proposed model has a key effect in reducing the time and computational complexity and achieved improved accuracy and detection rate. The accuracy of our proposed model was measured as 99.5 % for specific-attack-labeled.
引用
收藏
页码:2160 / 2167
页数:8
相关论文
共 27 条
[1]   An enhanced J48 classification algorithm for the anomaly intrusion detection systems [J].
Aljawarneh, Shadi ;
Yassein, Muneer Bani ;
Aljundi, Mohammed .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5) :10549-10565
[2]   An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems [J].
Almalawi, Abdulmohsen ;
Yu, Xinghuo ;
Tari, Zahir ;
Fahad, Adil ;
Khalil, Ibrahim .
COMPUTERS & SECURITY, 2014, 46 :94-110
[3]  
[Anonymous], IND NETWORK SECURITY
[4]  
[Anonymous], 2007, INT C CRIT INFR PROT
[5]  
[Anonymous], 2000, ACM SIGKDD EXPLORATI
[6]  
[Anonymous], 2015, Industrial control system simulation and data logging for intrusion detection system research
[7]  
[Anonymous], CNN COM
[8]  
[Anonymous], 2017, J COMPUTATIONAL SCI
[9]  
Bigham J, 2003, LECT NOTES COMPUT SC, V2776, P171
[10]  
Cheung S., 2007, P SCADA SECURITY SCI, V46, P1