Security monitoring method for ICS based on information gain ratio and maximum entropy model

被引:0
作者
Li, Shenggang [1 ,2 ,3 ]
Shang, Wenli [2 ,3 ]
Chen, Chunyu [2 ,3 ]
Lu, Yan [4 ]
Dong, Zhiwei [4 ]
Xu, Ye [1 ]
机构
[1] Shenyang Ligong Univ, Sch Automat & Elect Engn, Shenyang, Peoples R China
[2] Chinese Acad Sci, Shenyang Inst Automat, Shenyang, Peoples R China
[3] Chinese Acad Sci, Inst Robot & Intelligent Mfg, Shenyang, Peoples R China
[4] State Grid Liaoning Elect Power Co Ltd, Elect Power Res Inst, Power Grid Technol Ctr, Shenyang 110006, Liaoning, Peoples R China
来源
2020 CHINESE AUTOMATION CONGRESS (CAC 2020) | 2020年
关键词
Industrial control system; Information gain ratio; Maximum entropy model; Security monitoring;
D O I
10.1109/CAC51589.2020.9327281
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's information age, in order to meet the requirement of high efficiency outlier detection in the production process of industrial control system, the intrusion characteristics are analyzed and warned in time to prevent from happening An intrusion detection scheme (IGR-MEM) based on information gain ratio feature selection and maximum entropy model is proposed. The collected industrial control data are normalized and a new information gain ratio feature selection method considering feature correlation and redundancy is proposed to choose the best feature subset from the network connection data. According to the extracted training sample feature subset, the maximum entropy model is devoted to construct the classifier, and finally the trained classifier is applied for intrusion detection. The test results express that the IGR-MEM scheme is able to select the best feature collection, improve the detection efficiency, and improve the accuracy of ICS security monitoring and reduce the false alarm rate compared with other algorithms.
引用
收藏
页码:2272 / 2277
页数:6
相关论文
共 16 条
[1]  
[Anonymous], INF CONTROL
[2]   USING MUTUAL INFORMATION FOR SELECTING FEATURES IN SUPERVISED NEURAL-NET LEARNING [J].
BATTITI, R .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 1994, 5 (04) :537-550
[3]  
Berger AL, 1996, COMPUT LINGUIST, V22, P39
[4]  
Chen Dongqing, 2018, Journal of Tsinghua University (Science and Technology), V58, P380, DOI 10.16511/j.cnki.qhdxxb.2018.25.019
[5]  
Chunlei Zhou, 2017, DATA ACQUISITION PRO, P997
[6]   Ensemble based sensing anomaly detection in wireless sensor networks [J].
Curiac, Daniel-Ioan ;
Volosencu, Constantin .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (10) :9087-9096
[7]  
Haibo Song, 2013, SOFTWARE GUIDE, V012, P68
[8]  
Lazarevic A, 2003, SIAM PROC S, P25
[9]  
LI H., STAT LEARNING METHOD
[10]  
MORRIS T, 2014, CRITICAL INFRASTRUCT