An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications

被引:105
|
作者
Beaver, Justin M. [1 ]
Borges-Hink, Raymond C. [1 ]
Buckner, Mark. A. [1 ]
机构
[1] Oak Ridge Natl Lab, Oak Ridge, TN 37830 USA
来源
2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2 | 2013年
关键词
SCADA; machine learning; intrusion detection; critical infrastructure protection; network;
D O I
10.1109/ICMLA.2013.105
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems have been designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in a critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.
引用
收藏
页码:54 / 59
页数:6
相关论文
共 50 条
  • [1] Evaluation of Machine Learning Algorithms for Detection of Malicious Traffic in SCADA Network
    Rajesh, L.
    Satyanarayana, Penke
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2022, 17 (02) : 913 - 928
  • [2] Evaluation of Machine Learning Algorithms for Detection of Malicious Traffic in SCADA Network
    L. Rajesh
    Penke Satyanarayana
    Journal of Electrical Engineering & Technology, 2022, 17 : 913 - 928
  • [3] AN EVALUATION OF MACHINE LEARNING ALGORITHMS TO DETECT ATTACKS IN SCADA NETWORK
    Tamy, Sara
    Belhadaoui, Hicham
    Almostafa Rabbah, Mahmoud
    Rabbah, Nabila
    Rifi, Mounir
    2019 7TH MEDITERRANEAN CONGRESS OF TELECOMMUNICATIONS (CMT 2019), 2019,
  • [4] Machine Learning Algorithm to Detect Malicious Codes
    Khan, Simon
    Majumder, Uttam
    CYBER SENSING 2017, 2017, 10185
  • [5] An Approach to Detect Malicious Activities in SCADA Systems
    Pramod, T. C.
    Sunitha, N. R.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [6] Machine Learning Approach to Detect Malicious Mobile Apps
    Kazemian, Hassan
    ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS, AIAI 2022, PART II, 2022, 647 : 124 - 135
  • [7] A novel machine learning pipeline to detect malicious anomalies for the Internet of Things
    Shukla, Raj Mani
    Sengupta, Shamik
    INTERNET OF THINGS, 2022, 20
  • [8] A Machine Learning Based Approach to Detect Malicious Fast Flux Networks
    Kumar, Sathish A. P.
    Xu, Brian
    2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 1676 - 1683
  • [9] Learning to Detect Malicious URLs
    Ma, Justin
    Saul, Lawrence K.
    Savage, Stefan
    Voelker, Geoffrey M.
    ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
  • [10] Apply machine learning techniques to detect malicious network traffic in cloud computing
    Amirah Alshammari
    Abdulaziz Aldribi
    Journal of Big Data, 8