Neural network based anomaly detection for SCADA systems

被引:0
作者
Reuter, Lenhard [1 ]
Jung, Oliver [1 ]
Magin, Julian [1 ]
机构
[1] AIT Austrian Inst Technol, Vienna, Austria
来源
2020 23RD CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN 2020) | 2020年
关键词
Neural networks; anomaly detection; SCADA; software-defined networking; supervised learning;
D O I
10.1109/icin48450.2020.9059436
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Neural networks are widely used for anomaly detection in order to identify and classify cyber attacks at network level. In particular in critical infrastructures like the electric power grid, the reliable detection and mitigation of attacks is vital as communication infrastructure availability is often indispensable for the proper operation of such systems. We propose a combination of a deep feed forward neural network as a classifier and a deep autoencoder for anomaly detection to gain a high detection rate and at the same time a low error rate. Two different data sets were used to evaluate the applicability and performance of our approach. The aim is to deploy our neural network based anomaly detection in an software-defined network (SDN) that is carrying SCADA traffic and where the controller is providing traffic flow information for anomaly detection.
引用
收藏
页码:194 / 201
页数:8
相关论文
共 28 条
[1]   Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection [J].
Abdulhammed, Razan ;
Musafer, Hassan ;
Alessa, Ali ;
Faezipour, Miad ;
Abuzneid, Abdelshakour .
ELECTRONICS, 2019, 8 (03)
[2]  
Aksu Dogukan, 2018, Computer and Information Sciences: 32nd International Symposium, ISCIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018. Communications in Computer and Information Science (935), P141, DOI 10.1007/978-3-030-00840-6_16
[3]   Identification of malicious activities in industrial internet of things based on deep learning models [J].
AL-Hawawreh, Muna ;
Moustafa, Nour ;
Sitnikova, Elena .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :1-11
[4]  
[Anonymous], 2018, TECH REP
[5]  
[Anonymous], 2015, OPENFLOW SWITCH SPEC
[6]  
[Anonymous], 2018, ARXIV180104613CS
[7]  
[Anonymous], 2016, Deep Learning
[8]  
[Anonymous], 2018, IEEE GEOSCIENCE REMO
[9]  
Aygun R. Can, 2017, 2017 IEEE 4th International Conference on Cyber-Security and Cloud Computing (CSCloud), P193, DOI 10.1109/CSCloud.2017.39
[10]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)