Early Intrusion Detection System using honeypot for industrial control networks

被引:15
|
作者
Pashaei, Abbasgholi [1 ]
Akbari, Mohammad Esmaeil [1 ]
Lighvan, Mina Zolfy [2 ]
Charmin, Asghar [1 ]
机构
[1] Islamic Azad Univ, Dept Elect Engn, Ahar Branch, Ahar, Iran
[2] Tabriz Univ, Dept Elect Engn, Tabriz, Iran
关键词
Intrusion detection; Honeypots; Reinforcement learning; SARSA;
D O I
10.1016/j.rineng.2022.100576
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Man-in-the-Middle (MITM) and Distributed Denial of Service (DDoS) attacks are significant threats, especially to Industrial Control Systems (ICS). The honeypot is one of the most common approaches to protecting the network against such attacks. This study proposes a Markov Decision Process (MDP) called the state-action-reward-state -action (SARSA) for honeypot design. The proposed system using environmental experiments can achieve greater accuracy and convergence speed than traditional IDSs. Here, we use two types of agents, one for classification and the other for the environment. The environmental agent tries to minimize the rewards given to the classi-fying agent. Therefore, the classification agent is forced to learn the most complicated policies, increasing its learning capability in the long term. Thus, the proposed method improves the level of interaction for the early detection of honeypots by recording aggressive behavior. It can be especially suitable for very imbalanced datasets. To evaluate the performance of the proposed method, we compare it with two categories of malicious ICS attacks, including MITM and DDoS. The results show that the proposed model is superior to traditional non-linear IDS models in terms of accuracy (<0.99) and F-measure (0.98).
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Intrusion Detection in Digital Twins for Industrial Control Systems
    Akbarian, Fatemeh
    Fitzgerald, Emma
    Kihl, Maria
    2020 28TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2020, : 338 - 343
  • [32] Industrial Control System Intrusion Detection Based on Feature Selection and Temporal Convolutional Network
    Shi L.
    Hou H.
    Xu X.
    Xu H.
    Chen H.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2022, 54 (06): : 238 - 247
  • [33] Research on Intrusion Detection of Industrial Control System Based on OPSO-BPNN Algorithm
    Yang, Huiting
    Chen, Tao
    Guo, Xuerang
    Wang, Xu
    Li, Feng
    PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 957 - 961
  • [34] An intrusion detection system for wireless sensor networks
    Onat, I
    Miri, A
    WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 253 - 259
  • [35] Design of Intrusion Detection Honeypot Using Social Leopard Algorithm to Detect IoT Ransomware Attacks
    Sibi Chakkaravarthy, S.
    Sangeetha, D.
    Cruz, Meenalosini Vimal
    Vaidehi, V.
    Raman, Balasubramanian
    IEEE ACCESS, 2020, 8 (08): : 169944 - 169956
  • [36] A hybrid intrusion detection system for mobile adhoc networks using fbid protocol
    Rajalakshmi D.
    Meena K.
    Rajalakshmi, D. (rajisacet@gmail.com), 1600, West University of Timisoara (21): : 137 - 145
  • [37] A HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE ADHOC NETWORKS USING FBID PROTOCOL
    Rajalakshmi, D.
    Meena, K.
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2020, 21 (01): : 137 - 145
  • [38] Intrusion Detection in Computer Networks using Tabu Search based Fuzzy System
    Mohamadi, Hamid
    Habibi, Jafar
    Saadi, Hamid
    PROCEEDINGS OF THE 2008 7TH IEEE INTERNATIONAL CONFERENCE ON CYBERNETIC INTELLIGENT SYSTEMS, 2008, : 221 - 226
  • [39] Intrusion detection using hierarchical neural networks
    Zhang, CL
    Jiang, J
    Kamel, M
    PATTERN RECOGNITION LETTERS, 2005, 26 (06) : 779 - 791
  • [40] Intrusion Detection Using Temporal Convolutional Networks
    Li, Zhipeng
    Qin, Zheng
    Shen, Pengbo
    Jiang, Liu
    NEURAL INFORMATION PROCESSING (ICONIP 2019), PT IV, 2019, 1142 : 168 - 178