Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems

被引:56
作者
Maglaras, Leandros A. [1 ]
Jiang, Jianmin [2 ]
Cruz, Tiago J. [3 ]
机构
[1] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[2] Univ Surrey, Dept Comp, Guildford, Surrey, England
[3] Univ Coimbra, Dept Informat Engn, P-3000 Coimbra, Portugal
关键词
OCSVM; Intrusion detection; SCADA systems; Social analysis; CHALLENGES;
D O I
10.1016/j.jisa.2016.04.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern Supervisory Control and Data Acquisition (SCADA) systems used by the electric utility industry to monitor and control electric power generation, transmission and distribution are recognized today as critical components of the electric power delivery infrastructure. SCADA systems are large, complex and incorporate increasing numbers of widely distributed components. The presence of a real time intrusion detection mechanism, which can cope with different types of attacks, is of great importance in order to defend a system against cyber attacks. This defense mechanism must be distributed, cheap and above all accurate, since false positive alarms or mistakes regarding the origin of the intrusion mean severe costs for the system. Recently an integrated detection mechanism, namely IT-OCSVM, was proposed, which is distributed in a SCADA network as a part of a distributed intrusion detection system (DIDS), providing accurate data about the origin and the time of an intrusion. In this paper we also analyze the architecture of the integrated detection mechanism and we perform extensive simulations based on real cyber attacks in a small SCADA testbed in order to evaluate the performance of the proposed mechanism. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:15 / 26
页数:12
相关论文
共 26 条
[1]  
[Anonymous], 2010, PATTERN CLASSIFICATI
[2]  
[Anonymous], THESIS
[3]  
[Anonymous], 2007, 4765 RFC
[4]   An architecture for intrusion detection using Autonomous Agents [J].
Balasubramaniyan, JS ;
Garcia-Fernandez, JO ;
Isacoff, D ;
Spafford, E ;
Zamboni, D .
14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, :13-24
[5]  
Bennett C., 2008, ENERGY 2030 C 2008 E, P1
[6]  
Chawla NV, 2004, J MACH LEARN RES, V5, P421
[7]  
Crosbie Mark., 1995, ACTIVE DEFENSE COMPU
[8]   Ensemble based sensing anomaly detection in wireless sensor networks [J].
Curiac, Daniel-Ioan ;
Volosencu, Constantin .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (10) :9087-9096
[9]   Anomaly-based network intrusion detection: Techniques, systems and challenges [J].
Garcia-Teodoro, P. ;
Diaz-Verdejo, J. ;
Macia-Fernandez, G. ;
Vazquez, E. .
COMPUTERS & SECURITY, 2009, 28 (1-2) :18-28
[10]   A Survey of Outlier Detection Methods in Network Anomaly Identification [J].
Gogoi, Prasanta ;
Bhattacharyya, D. K. ;
Borah, B. ;
Kalita, Jugal K. .
COMPUTER JOURNAL, 2011, 54 (04) :570-588