Industrial Control System Attack Detection Model Based on Bayesian Network and Timed Automata

被引:0
作者
Sun, Ye [1 ]
Wang, Gang [1 ,2 ]
Yan, Pei-zhi [2 ]
Zhang, Li-fang [1 ]
Yao, Xu [1 ]
机构
[1] Mongolia Ind Univ, Hohhot 010050, Peoples R China
[2] Informat Construct & Management Ctr, Hohhot, Peoples R China
来源
BIG DATA, BIGDATA 2021 | 2022年 / 12988卷
关键词
Bayesian network; Timed automata; Industrial control system; Attack detection;
D O I
10.1007/978-3-030-96282-1_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The current industrial control system attack detection methods are single, the detection results are fuzzy and cannot be applied to the domestic industrial environment. In response to the above problems, an industrial control system attack detection model based on Bayesian network (BN) and Timed automata (TA) theory is proposed. First, collect the real industrial purification data of the aluminum factory, that is, the sensor and actuator signals, and preprocess the signals through time compression, segmentation, and queue division; secondly, establish Timed automata and Bayesian network models respectively, using probability time automatization The computer simulates the regular behavior of the time series, and at the same time uses the Bayesian network to build the dependency relationship between the sensor and the actuator; finally, the model's detection result of the attack data is calculated. Theoretical analysis and experimental results show that compared with Deep Neural Network (DNN) and Support Vector Machine (SVM), the model in the article has improved time and accuracy.
引用
收藏
页码:77 / 90
页数:14
相关论文
共 19 条
[1]  
Adepu S., 2016, P 2 INT WORKSH SOFTW
[2]   Using Process Invariants to Detect Cyber Attacks on a Water Treatment System [J].
Adepu, Sridhar ;
Mathur, Aditya .
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 :91-104
[3]   Generalized attacker and attack models for Cyber Physical Systems [J].
Adepu, Sridhar ;
Mathur, Aditya .
PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, :283-292
[4]   Recent Advances in Probabilistic Graphical Models [J].
Bielza, Concha ;
Moral, Serafin ;
Salmeron, Antonio .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2015, 30 (03) :207-208
[5]  
COOPER GF, 1992, MACH LEARN, V9, P309, DOI 10.1007/BF00994110
[6]  
Gao W, 2014, J DIGIT FORENSICS SE, V9, P37
[7]   Anomaly Detection in Cyber Physical Systems using Recurrent Neural Networks [J].
Goh, Jonathan ;
Adepu, Sridhar ;
Tan, Marcus ;
Shan, Lee Zi .
2017 IEEE 18TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2017), 2017, :140-145
[8]  
Herbreteau, 2016, J COMPUT SCI-NETH, V07
[9]   Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning [J].
Inoue, Jun ;
Yamagata, Yoriyuki ;
Chen, Yuqi ;
Poskitt, Christopher M. ;
Sun, Jun .
2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017), 2017, :1058-1065
[10]  
Junejo K.N., 2016, P ACM INT WORKSH CYB