Industrial Datasets with ICS Testbed and Attack Detection Using Machine Learning Techniques

被引:15
作者
Mubarak, Sinil [1 ]
Habaebi, Mohamed Hadi [1 ]
Islam, Md Rafiqul [1 ]
Balla, Asaad [1 ]
Tahir, Mohammad [2 ]
Elsheikh, Elfatih A. A. [3 ]
Suliman, F. M. [3 ]
机构
[1] Int Islamic Univ Malaysia, IoT & Wireless Commun Protocols Lab, Kuala Lumpur 53100, Selangor, Malaysia
[2] Sunway Univ, Subang Jaya 47500, Selangor, Malaysia
[3] King Khalid Univ, Dept Elect Engn, Coll Engn, Abha 61421, Saudi Arabia
关键词
SCADA; industrial control system; intrusion detection system; machine learning; anomaly detection;
D O I
10.32604/iasc.2022.020801
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial control systems (ICS) are the backbone for the implementation of cybersecurity solutions. They are susceptible to various attacks, due to openness in connectivity, unauthorized attempts, malicious attacks, use of more commercial off the shelf (COTS) software and hardware, and implementation of Internet protocols (IP) that exposes them to the outside world. Cybersecurity solutions for Information technology (IT) secured with firewalls, intrusion detection/protection systems do nothing much for Operational technology (OT) ICS. An innovative concept of using real operational technology network traffic-based testbed, for cyber-physical system simulation and analysis, is presented. The testbed is equipped with real-time attacks using in-house penetration test tool with reconnaissance, interception, and firmware analysis scenarios. The test cases with different real-time hacking scenarios are implemented with the ICS cyber test kit, and its industrial datasets are captured which can be utilized for Deep packet inspection (DPI). The DPI provides more visibility into the contents of OT network traffic based on OT protocols. The Machine learning (ML) techniques are deployed for cyber-attack detection of datasets from the cyber kit. The performance metrics such as accuracy, precision, recall, F1 score are evaluated and cross validated for different ML algorithms for anomaly detection. The decision tree (DT) ML technique is optimized with pruning method which provides an attack detection accuracy of 96.5%. The deep learning (DL) techniques has been used recently for enhanced OT intrusion detection performances.
引用
收藏
页码:1345 / 1360
页数:16
相关论文
共 22 条
[1]   Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection [J].
Abdulhammed, Razan ;
Musafer, Hassan ;
Alessa, Ali ;
Faezipour, Miad ;
Abuzneid, Abdelshakour .
ELECTRONICS, 2019, 8 (03)
[2]   An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems [J].
Almalawi, Abdulmohsen ;
Yu, Xinghuo ;
Tari, Zahir ;
Fahad, Adil ;
Khalil, Ibrahim .
COMPUTERS & SECURITY, 2014, 46 :94-110
[3]  
Almseidin M, 2017, I S INTELL SYST INFO, P277, DOI 10.1109/SISY.2017.8080566
[4]  
[Anonymous], 2018, TREND STUDY KASPERSK
[5]  
Diaz J. J., 2011, USING SNORT INTRUSIO
[6]   An Adaptive Ensemble Machine Learning Model for Intrusion Detection [J].
Gao, Xianwei ;
Shan, Chun ;
Hu, Changzhen ;
Niu, Zequn ;
Liu, Zhen .
IEEE ACCESS, 2019, 7 :82512-82521
[7]   Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies [J].
Hakak, Saqib ;
Khan, Wazir Zada ;
Imran, Muhammad ;
Choo, Kim-Kwang Raymond ;
Shoaib, Muhammad .
IEEE ACCESS, 2020, 8 :124134-124144
[8]  
Jicha A, 2016, IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, P196, DOI 10.1109/ISI.2016.7745468
[9]  
Keshk M, 2017, MIL COMM INF SYST CO
[10]   The convolution neural network based agent vehicle detection using forward-looking sonar image [J].
Kim, Juhwan ;
Cho, Hyeonwoo ;
Pyo, Juhyun ;
Kim, Byeongjin ;
Yu, Son-Cheol .
OCEANS 2016 MTS/IEEE MONTEREY, 2016,