Add-On Anomaly Threshold Technique for Improving Unsupervised Intrusion Detection on SCADA Data

被引:11
作者
Almalawi, Abdulmohsen [1 ]
Fahad, Adil [2 ]
Tari, Zahir [3 ]
Khan, Asif Irshad [1 ]
Alzahrani, Nouf [2 ]
Bakhsh, Sheikh Tahir [1 ]
Alassafi, Madini O. [1 ]
Alshdadi, Abdulrahman [4 ]
Qaiyum, Sana [5 ]
机构
[1] King Abdulaziz Univ, Sch Comp Sci & Informat Technol, Jeddah 21589, Saudi Arabia
[2] Al Baha Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, Al Baha 65527, Saudi Arabia
[3] RMIT Univ, Sch Comp Sci & Informat Technol CSIT, Distributed Syst & Networking DSN Discipline, Melbourne, Vic 3000, Australia
[4] Jeddah Univ, Coll Comp Sci & Engn, Dept Informat Syst & Technol, Jeddah 23218, Saudi Arabia
[5] Univ Teknol PETRONAS, Ctr Res Data Sci, Seri Iskandar 32610, Perak, Malaysia
关键词
SCADA security; intrusion detection; unsupervised learning; Industrial Internet of Things (IIoT); information-security; security threats; vulnerability measurement; ATTACKS; SYSTEM;
D O I
10.3390/electronics9061017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervisory control and data acquisition (SCADA) systems monitor and supervise our daily infrastructure systems and industrial processes. Hence, the security of the information systems of critical infrastructures cannot be overstated. The effectiveness of unsupervised anomaly detection approaches is sensitive to parameter choices, especially when the boundaries between normal and abnormal behaviours are not clearly distinguishable. Therefore, the current approach in detecting anomaly for SCADA is based on the assumptions by which anomalies are defined; these assumptions are controlled by a parameter choice. This paper proposes an add-on anomaly threshold technique to identify the observations whose anomaly scores are extreme and significantly deviate from others, and then such observations are assumed to be "abnormal". The observations whose anomaly scores are significantly distant from "abnormal" ones will be assumed as "normal". Then, the ensemble-based supervised learning is proposed to find a global and efficient anomaly threshold using the information of both "normal"/"abnormal" behaviours. The proposed technique can be used for any unsupervised anomaly detection approach to mitigate the sensitivity of such parameters and improve the performance of the SCADA unsupervised anomaly detection approaches. Experimental results confirm that the proposed technique achieved a significant improvement compared to the state-of-the-art of two unsupervised anomaly detection algorithms.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 37 条
[1]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[2]   An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things [J].
AL-Hawawreh, Muna ;
Sitnikova, Elena ;
den Hartog, Frank .
3RD INTERNATIONAL CONFERENCE ON BIG DATA AND INTERNET OF THINGS (BDIOT 2019), 2018, :83-87
[3]   Diagnosis mechanism for accurate monitoring in critical infrastructure protection [J].
Alcaraz, Cristina ;
Lopez, Javier .
COMPUTER STANDARDS & INTERFACES, 2014, 36 (03) :501-512
[4]   WASAM: A dynamic wide-area situational awareness model for critical domains in Smart Grids [J].
Alcaraz, Cristina ;
Lopez, Javier .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 :146-154
[5]   kNNVWC: An Efficient k-Nearest Neighbors Approach Based on Various-Widths Clustering [J].
Almalawi, Abdul Mohsen ;
Fahad, Adil ;
Tari, Zahir ;
Cheema, Muhammad Aamir ;
Khalil, Ibrahim .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (01) :68-81
[6]   An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems [J].
Almalawi, Abdulmohsen ;
Fahad, Adil ;
Tari, Zahir ;
Alamri, Abdullah ;
AlGhamdi, Rayed ;
Zomaya, Albert Y. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) :893-906
[7]   An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems [J].
Almalawi, Abdulmohsen ;
Yu, Xinghuo ;
Tari, Zahir ;
Fahad, Adil ;
Khalil, Ibrahim .
COMPUTERS & SECURITY, 2014, 46 :94-110
[8]  
[Anonymous], 1993, Series Title: Morgan Kaufmann series in {M}achine {L}earning Publication Title: Morgan Kaufmann San Mateo California
[9]  
[Anonymous], CLUSTERING APPROACH
[10]   Unsupervised machine learning for network-centric anomaly detection in IoT [J].
Bhatia, Randeep ;
Benno, Steven ;
Esteban, Jairo ;
Lakshman, T., V ;
Grogan, John .
BIG-DAMA'19: PROCEEDINGS OF THE 3RD ACM CONEXT WORKSHOP ON BIG DATA, MACHINE LEARNING AND ARTIFICIAL INTELLIGENCE FOR DATA COMMUNICATION NETWORKS, 2019, :42-48