Roll forward validation based decision tree classification for detecting data integrity attacks in industrial internet of things

被引:16
作者
Madhawa, Surendar [1 ]
Balakrishnan, P. [2 ]
Arumugam, Umamakeswari [1 ]
机构
[1] SASTRA, Sch Comp, Thanjavur 613401, Tamil Nadu, India
[2] Vellore Inst Technol, SCOPE, Vellore, Tamil Nadu, India
关键词
Industrial internet of things; software defined networking; IDS; roll-forward validation; decision tree; INTRUSION DETECTION; NETWORKING; SYSTEMS;
D O I
10.3233/JIFS-169946
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data Integrity attack is a major hindrance to the evolution of Industrial Internet of Things (IIoT) as it leads to immense financial loss or even human fatality. The existing security features in Software Defined Networking (SDN), which is emphatically superior to the traditional networks mitigate the integrity attacks to some extent. However, a generic, robust, secure and resilient Intrusion Detection System (IDS) for IIoT is still lacking in the literature. Towards this goal, a generic IDS is already proposed in our earlier research work which combines both anomaly as well as rule-based intrusion detection techniques and successfully tested against the real-time dataset obtained from the water purification process in a test bed at the Singapore University of Technology and Design (SUTD). This research work proposes a supervised learning approach that utilizes Roll-forward technique for validation and Classification and Regression Trees (CART) with invariants for categorization to find anomalousness in the water treatment process. The proposed work incorporates the capability to substantiate time-series data through Roll-forward validation which is then succeeded by utilization of the CART with invariants for classification. The proposed work is simulated using Mininet tool and the train and test accuracies are 99.9% and 98.1% respectively.
引用
收藏
页码:2355 / 2366
页数:12
相关论文
共 34 条
[1]   Using Process Invariants to Detect Cyber Attacks on a Water Treatment System [J].
Adepu, Sridhar ;
Mathur, Aditya .
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 :91-104
[2]   An Investigation into the Response of a Water Treatment System to Cyber Attacks [J].
Adepu, Sridhar ;
Mathur, Aditya .
2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE), 2016, :141-148
[3]   Software Defined Networking for Communication and Control of Cyber-physical Systems [J].
Ahmed, Khandakar ;
Blech, Jan Olaf ;
Gregory, Mark A. ;
Schmidt, Heinrich .
2015 IEEE 21ST INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2015, :803-808
[4]   An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems [J].
Almalawi, Abdulmohsen ;
Fahad, Adil ;
Tari, Zahir ;
Alamri, Abdullah ;
AlGhamdi, Rayed ;
Zomaya, Albert Y. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) :893-906
[5]  
[Anonymous], 2017, FRAMEWORK CYBER PHYS, V2
[6]  
[Anonymous], 2014, of-Config 1.2", P1
[7]  
[Anonymous], 2016, P 11 INT C CRIT INF
[8]  
Antonioli D., 2015, P 1 ACM WORKSH CYB P, P91, DOI DOI 10.1145/2808705.2808715
[9]  
Breiman L., 1984, Classification and Regression Trees, V1
[10]   Lightweight adaptive Random-Forest for IoT rule generation and execution [J].
Domb, Menachem ;
Bonchek-Dokow, Elisheva ;
Leshem, Guy .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 34 :218-224