SSO-IF: An Outlier Detection Approach for Intrusion Detection in SCADA Systems

被引:5
|
作者
Chaithanya, P. S. [1 ]
Priyanga, S. [1 ]
Pravinraj, S. [1 ]
Sriram, V. S. Shankar [1 ]
机构
[1] SASTRA Deemed Univ, Ctr Informat Super Highway CISH, Sch Comp, Thanjavur 613401, Tamil Nadu, India
来源
INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019 | 2020年 / 89卷
关键词
SCADA; Intrusion detection system; Isolation forest; Salp swarm optimization; ALGORITHM;
D O I
10.1007/978-981-15-0146-3_89
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervisory Control and Data Acquisition (SCADA) systems play a prominent role in monitoring and controlling the Critical Infrastructures (CIs) such as water distribution, nuclear plants, and chemical industries. On the other hand, SCADA systems are highly exposed to new vulnerabilities as it highly relies on the internet. Machine learning approaches have been employed to detect the cyberattacks injected by the attackers in CIs. However, those approaches failed to protect the CIs against the ever-advancing nature of cyberattacks. This work presents Salp Swarm Optimization-based Isolation Forest (SSO-IF) to build an efficient SCADA intrusion detection system, and the experiments were carried out using power system dataset from Mississippi State University. The performance of SSO-IF was validated over the state-of-the-art intrusion detection techniques in terms of classification accuracy and detection rate.
引用
收藏
页码:921 / 929
页数:9
相关论文
共 50 条
  • [31] Machine learning-based intrusion detection for SCADA systems in healthcare
    Tolgahan Öztürk
    Zeynep Turgut
    Gökçe Akgün
    Cemal Köse
    Network Modeling Analysis in Health Informatics and Bioinformatics, 2022, 11
  • [32] Deep-Learning-Based Network Intrusion Detection for SCADA Systems
    Yang, Huan
    Cheng, Liang
    Chuah, Mooi Choo
    2019 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2019,
  • [33] Using Outlier Detection to Reduce False Positives in Intrusion Detection
    Xiao, Fu
    Li, Xie
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 26 - +
  • [34] HML-DS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems
    Khan, Izhar Ahmed
    Pi, Dechang
    Khan, Zaheer Ullah
    Hussain, Yasir
    Nawaz, Asif
    IEEE ACCESS, 2019, 7 : 89507 - 89521
  • [35] Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection
    Zhang, Jiong
    Zulkernine, Mohammad
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2388 - 2393
  • [36] Unsupervised Outlier Detection Technique for Intrusion Detection in Cloud Computing
    Kumar, Manoj
    Mathur, Robin
    2014 INTERNATIONAL CONFERENCE FOR CONVERGENCE OF TECHNOLOGY (I2CT), 2014,
  • [37] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection
    Yin, Shang-Nan
    Kang, Ho-Seok
    Kim, Sung-Ryul
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299
  • [38] A Testbed for SCADA Cyber Security and Intrusion Detection
    Singh, Prateek
    Garg, Saurabh
    Kumar, Vinod
    Saquib, Zia
    2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,
  • [39] Dynamic Rule Generation for SCADA Intrusion Detection
    Nivethan, Jeyasingam
    Papa, Manioc
    2016 IEEE SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2016,
  • [40] Intrusion detection and event monitoring in SCADA networks
    Oman, Paul
    Phillips, Matthew
    CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 : 161 - +