SSO-IF: An Outlier Detection Approach for Intrusion Detection in SCADA Systems

被引:5
|
作者
Chaithanya, P. S. [1 ]
Priyanga, S. [1 ]
Pravinraj, S. [1 ]
Sriram, V. S. Shankar [1 ]
机构
[1] SASTRA Deemed Univ, Ctr Informat Super Highway CISH, Sch Comp, Thanjavur 613401, Tamil Nadu, India
来源
INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019 | 2020年 / 89卷
关键词
SCADA; Intrusion detection system; Isolation forest; Salp swarm optimization; ALGORITHM;
D O I
10.1007/978-981-15-0146-3_89
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervisory Control and Data Acquisition (SCADA) systems play a prominent role in monitoring and controlling the Critical Infrastructures (CIs) such as water distribution, nuclear plants, and chemical industries. On the other hand, SCADA systems are highly exposed to new vulnerabilities as it highly relies on the internet. Machine learning approaches have been employed to detect the cyberattacks injected by the attackers in CIs. However, those approaches failed to protect the CIs against the ever-advancing nature of cyberattacks. This work presents Salp Swarm Optimization-based Isolation Forest (SSO-IF) to build an efficient SCADA intrusion detection system, and the experiments were carried out using power system dataset from Mississippi State University. The performance of SSO-IF was validated over the state-of-the-art intrusion detection techniques in terms of classification accuracy and detection rate.
引用
收藏
页码:921 / 929
页数:9
相关论文
共 50 条
  • [41] DISTRIBUTED INTRUSION DETECTION SYSTEM FOR SCADA PROTOCOLS
    Fovino, Igor Nai
    Masera, Marcelo
    Guglielmi, Michele
    Carcano, Andrea
    Trombetta, Alberto
    CRITICAL INFRASTRUCTURE PROTECTION IV, 2010, 342 : 95 - +
  • [42] An Approach for Independent Intrusion Detection Management Systems A Standardized Intrusion Detection Parameterization Format
    Boesch, Bjoern-C.
    FUTURE SECURITY, 2012, 318 : 303 - 306
  • [43] Distributed Intrusion Detection Based on Outlier Mining
    Da, Wei
    Ting, Han Shao
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 343 - 348
  • [44] A Deviation Based Outlier Intrusion Detection System
    Pareek, Vikas
    Mishra, Aditi
    Sharma, Arpana
    Chauhan, Rashmi
    Bansal, Shruti
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 395 - 401
  • [45] A Hybrid Approach for Big Data Outlier Detection from Electric Power SCADA System
    Alves, W.
    Martins, D.
    Bezerra, U.
    Klautau, A.
    IEEE LATIN AMERICA TRANSACTIONS, 2017, 15 (01) : 57 - 64
  • [46] A Review of Research Work on Network-Based SCADA Intrusion Detection Systems
    Rakas, Slavica V. Bostjancic
    Stojanovic, Mirjana D.
    Markovic-Petrovic, Jasna D.
    IEEE ACCESS, 2020, 8 : 93083 - 93108
  • [47] Security Evaluation of Two Intrusion Detection Systems in Smart Grid SCADA Environment
    Singh, Vivek Kumar
    Ebrahem, Haythem
    Govindarasu, Manimaran
    2018 NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2018,
  • [48] Fuzzy ESVDF approach for Intrusion Detection Systems
    Zaman, Safaa
    Karray, Fakhri
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 539 - 545
  • [49] An Approach for Optimizing Ensemble Intrusion Detection Systems
    Stiawan, Deris
    Heryanto, Ahmad
    Bardadi, Ali
    Rini, Dian Palupi
    Subroto, Imam Much Ibnu
    Kurniabudi
    Bin Idris, Mohd Yazid
    Abdullah, Abdul Hanan
    Kerim, Bedine
    Budiarto, Rahmat
    IEEE ACCESS, 2021, 9 (09): : 6930 - 6947
  • [50] Testing Intrusion Detection Systems: An engineered approach
    El Rab, Mohammed S. Gad
    El Kalam, Anas Abou
    PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND APPLICATIONS, 2006, : 270 - +