Anomaly behavior detection and reliability assessment of control systems based on association rules

被引:15
作者
Jie, Xinchun [1 ,2 ]
Wang, Haikuan [1 ]
Fei, Minrui [1 ]
Du, Dajun [1 ]
Sun, Qing [1 ]
Yang, T. C. [3 ]
机构
[1] Shanghai Univ, Sch Mech Engn & Automat, Shanghai 200072, Peoples R China
[2] Inner Mongolia Univ Sci & Technol, Sch Informat & Engn, Baotou 014010, Peoples R China
[3] Univ Sussex, Dept Engn & Design, Brighton BN1 9QT, E Sussex, England
基金
中国国家自然科学基金;
关键词
Anomaly detection; Network intrusion; Association rules; Apriori algorithm; ATTACKS;
D O I
10.1016/j.ijcip.2018.06.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Because of the high integration of control, communication, computer and network technology, how to deal with various anomaly behaviors of control systems is a problem that should be solved by researchers. Especially some activities such as data injections, DoS attacks and device failure must be considered. Based on the analysis of dynamic behaviors of industrial process control systems with varying process state variables, a data mining method is proposed on summarizing normal behavior features of the control systems. Depending on association rules, a similarity factor is formulated using a real-time data mining method for describing the likeness between real-time frequent itemsets and normal frequent item-sets. Representative values of change behaviors for process variables and the corresponding generation method are illustrated in detail. On the basis of comparison between several real-time frequent itemsets and the normal frequent itemsets, a reliability parameter is given to describe the abnormal status of a control system within a certain time. Simulation results show that the proposed method can detect anomaly behaviors of a process control system in time, which has practical significance in industrial applications. (C) 2018 Published by Elsevier B.V.
引用
收藏
页码:90 / 99
页数:10
相关论文
共 24 条
[1]  
Agrawal R., 2000, J COMPUT SCI TECHNOL, V15, P619
[2]  
[Anonymous], 2005, FINDING GROUPS DATA, DOI DOI 10.1002/9780470316801
[3]  
[Anonymous], 2011, P 6 ACM S INF COMP C, DOI DOI 10.1145/1966913.1966959
[4]  
Ardenas A., 2008, Proceedings of the 3rd conference on Hot topics in security, San Jose, CA, P1
[5]   Lessons from Stuxnet [J].
Chen, Thomas M. ;
Abu-Nimeh, Saeed .
COMPUTER, 2011, 44 (04) :91-93
[6]   Quantized control of distributed event-triggered networked control systems with hybrid wired-wireless networks communication constraints [J].
Du, Dajun ;
Qi, Bo ;
Fei, Minrui ;
Wang, Zhaoxia .
INFORMATION SCIENCES, 2017, 380 :74-91
[7]   Multiple event-triggered H2/H∞ filtering for hybrid wired-wireless networked systems with random network-induced delays [J].
Du, Dajun ;
Qi, Bo ;
Fei, Minrui ;
Peng, Chen .
INFORMATION SCIENCES, 2015, 325 :393-408
[8]   Using timing-based side channels for anomaly detection in industrial control systems [J].
Dunlap, Stephen ;
Butts, Jonathan ;
Lopez, Juan ;
Rice, Mason ;
Mullins, Barry .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2016, 15 :12-26
[9]  
Gawand Hemangi L., 2013, 10 IFAC DYCOPS 1, V10, P702
[10]   Experimental assessment of network design approaches for protecting industrial control systems [J].
Genge, Bela ;
Graur, Flavius ;
Haller, Piroska .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 11 :24-38