Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems

被引:19
作者
Alkahtani, Hasan [1 ,2 ]
Aldhyani, Theyazn H. H. [1 ,3 ]
机构
[1] King Faisal Univ, Vice Presidency Grad Studies & Sci Res, Deanship Sci Res, Al Bilad Bank Scholarly Chair Food Secur Saudi Ar, Al Hasa 31982, Saudi Arabia
[2] King Faisal Univ, Coll Comp Sci & Informat Technol, Al Hasa 31982, Saudi Arabia
[3] King Faisal Univ, Appl Coll Abqaiq, Al Hasa 31982, Saudi Arabia
关键词
industrial control systems; intrusion detection system; machine learning; deep learning; cyberattack; NETWORKS; INTERNET;
D O I
10.3390/electronics11111717
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial control systems (ICSs) for critical infrastructure are extensively utilized to provide the fundamental functions of society and are frequently employed in critical infrastructure. Therefore, security of these systems from cyberattacks is essential. Over the years, several proposals have been made for various types of cyberattack detection systems, with each concept using a distinct set of processes and methodologies. However, there is a substantial void in the literature regarding approaches for detecting cyberattacks in ICSs. Identifying cyberattacks in ICSs is the primary aim of this proposed research. Anomaly detection in ICSs based on an artificial intelligence algorithm is presented. The methodology is intended to serve as a guideline for future research in this area. On the one hand, machine learning includes logistic regression, k-nearest neighbors (KNN), linear discriminant analysis (LDA), and decision tree (DT) algorithms, deep learning long short-term memory (LSTM), and the convolution neural network and long short-term memory (CNN-LSTM) network to detect ICS malicious attacks. The proposed algorithms were examined using real ICS datasets from the industrial partners Necon Automation and International Islamic University Malaysia (IIUM). There were three types of attacks: man-in-the-middle (mitm) attack, web-server access attack, and telnet attack, as well as normal. The proposed system was developed in two stages: binary classification and multiclass classification. The binary classification detected the malware as normal or attacks and the multiclass classification was used for detecting all individual attacks. The KNN and DT algorithms achieved superior accuracy (100%) in binary classification and multiclass classification. Moreover, a sensitivity analysis method was presented to predict the error between the target and prediction values. The sensitivity analysis results showed that the KNN and DT algorithms achieved R2 = 100% in both stages. The obtained results were compared with existing systems; the proposed algorithms outperformed existing systems.
引用
收藏
页数:25
相关论文
共 50 条
[1]   A feature reduced intrusion detection system using ANN classifier [J].
Akashdeep ;
Manzoor, Ishfaq ;
Kumar, Neeraj .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 88 :249-257
[2]   Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity [J].
Aldhyani, Theyazn H. H. ;
Alkahtani, Hasan .
SENSORS, 2022, 22 (01)
[3]   Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications [J].
Alkahtani, Hasan ;
Aldhyani, Theyazn H. H. .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[4]   RETRACTED: Adaptive Anomaly Detection Framework Model Objects in Cyberspace (Retracted article. See vol. 2023, 2023) [J].
Alkahtani, Hasan ;
Aldhyani, Theyazn H. H. ;
Al-Yaari, Mohammed .
APPLIED BIONICS AND BIOMECHANICS, 2020, 2020
[5]   An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems [J].
Almalawi, Abdulmohsen ;
Yu, Xinghuo ;
Tari, Zahir ;
Fahad, Adil ;
Khalil, Ibrahim .
COMPUTERS & SECURITY, 2014, 46 :94-110
[6]   A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System [J].
Almomani, Omar .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01) :409-429
[7]  
Almseidin M, 2017, I S INTELL SYST INFO, P277, DOI 10.1109/SISY.2017.8080566
[8]   An intrusion detection system for connected vehicles in smart cities [J].
Aloqaily, Moayad ;
Otoum, Safa ;
Al Ridhawi, Ismaeel ;
Jararweh, Yaser .
AD HOC NETWORKS, 2019, 90
[9]  
[Anonymous], THREATS IND CONTROL
[10]  
[Anonymous], 2012, P 1 ANN C RES INF TE, DOI [DOI 10.1145/2380790.2380805, 10.1145/2380790.2380805]