A Dual-Isolation-Forests-Based Attack Detection Framework for Industrial Control Systems

被引:47
作者
Elnour, Mariam [1 ]
Meskin, Nader [1 ]
Khan, Khaled [2 ]
Jain, Raj [3 ]
机构
[1] Qatar Univ, Dept Elect Engn, Doha, Qatar
[2] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
[3] Washington Univ, Dept Comp Sci & Engn, St Louis, MO 63130 USA
关键词
Attack detection; principal component analysis (PCA); isolation forest (IF); industrial control systems; cybersecurity; INTRUSION DETECTION; CLASSIFICATION;
D O I
10.1109/ACCESS.2020.2975066
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cybersecurity of industrial control systems (ICSs) is becoming increasingly critical under the current advancement in the cyber activity and the Internet of Things (IoT) technologies, and their direct impact on several life aspects such as safety, economy, and security. This paper presents a novel semi-supervised dual isolation forests-based (DIF) attack detection system that has been developed using the normal process operation data only and is demonstrated on a scale-down ICS known as the Secure Water Treatment (SWaT) testbed and the Water Distribution (WADI) testbed. The proposed cyber-attack detection framework is composed of two isolation forest models that are trained independently using the normalized raw data and a pre-processed version of the data using Principal Component Analysis (PCA), respectively, to detect attacks by separating-away anomalies. The performance of the proposed method is compared with the previous works, and it demonstrates improvements in terms of the attack detection capability, computational requirements, and applicability to high dimensional systems.
引用
收藏
页码:36639 / 36651
页数:13
相关论文
共 37 条
  • [1] Ahmed C.M., 2017, P 3 INT WORKSH CYB P, P25
  • [2] Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest
    Ahmed, Saeed
    Lee, YoungDoo
    Hyun, Seung-Ho
    Koo, Insoo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (10) : 2765 - 2777
  • [3] [Anonymous], 2006, NIPS
  • [4] [Anonymous], IEEE T DEPENDABLE SE
  • [5] [Anonymous], 2017, UKRAINE POWER CUT WA
  • [6] [Anonymous], IEEE T SUSTAIN COMPU
  • [7] [Anonymous], 2010, 2010 ECRIME RES SUMM, DOI DOI 10.1109/ECRIME.2010.5706699
  • [8] [Anonymous], 2018, ARXIV181005221
  • [9] [Anonymous], IRAN ADMITS CYBER AT
  • [10] [Anonymous], 2018, CYBERATTACK CRITICAL