Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests

被引:53
作者
Anton, Simon D. Duque [1 ]
Sinha, Sapna [1 ]
Schotten, Hans Dieter [1 ]
机构
[1] German Res Ctr AI, Intelligent Networks Res Grp, Kaiserslautern, Germany
来源
2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM) | 2019年
关键词
Learning; Artificial Intelligence; Cyber Security; IT Security; Industrial; SYSTEMS;
D O I
10.23919/softcom.2019.8903672
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attacks on industrial enterprises are increasing in number as well as in effect. Since the introduction of industrial control systems in the 1970's, industrial networks have been the target of malicious actors. More recently, the political and warfare-aspects of attacks on industrial and critical infrastructure are becoming more relevant. In contrast to classic home and office IT systems, industrial IT, so-called OT systems, have an effect on the physical world. Furthermore, industrial devices have long operation times, sometimes several decades. Updates and fixes are tedious and often not possible. The threats on industry with the legacy requirements of industrial environments creates the need for efficient intrusion detection that can be integrated into existing systems. In this work, the network data containing industrial operation is analysed with machine learning- and time series-based anomaly detection algorithms in order to discover the attacks introduced to the data. Two different data sets are used, one Modbus-based gas pipeline control traffic and one OPC UA-based batch processing traffic. In order to detect attacks, two machine learning-based algorithms are used, namely SVM and Random Forest. Both perform well, with Random Forest slightly outperforming SVM. Furthermore, extracting and selecting features as well as handling missing data is addressed in this work.
引用
收藏
页码:465 / 470
页数:6
相关论文
共 43 条
[1]  
[Anonymous], 2015, P 1 ACM WORKSH CYB P, DOI 10.1145/2732198.2732200
[2]  
[Anonymous], 2012, MODBUS Application Protocol Specification V1.1b
[3]  
[Anonymous], 2013, PROCEDIA TECHNOLOGY
[4]  
[Anonymous], 2015, 7 ANN SE CYB SEC SUM
[5]  
Anton S., 2018, P 13 INT C AV REL SE, P1
[6]  
Anton S. D. D., 2019, ARES 19
[7]  
Anton S. Duque, 2019, INT C CYB WARF SEC I
[8]  
Anton S. Duque, 2019, ITG FACHTAGUNG MOBIL
[9]  
Anton S. Duque, 2019, 18 EUR C CYB WARF SE
[10]  
Antón SD, 2017, 2017 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS), P97