An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System

被引:157
作者
Al-Abassi, Abdulrahman [1 ]
Karimipour, Hadis [1 ]
Dehghantanha, Ali [1 ]
Parizi, Reza M. [2 ]
机构
[1] Univ Guelph, Cyber Sci Lab, Guelph, ON N1G 2W1, Canada
[2] Kennesaw State Univ, Coll Comp & Software Engn, Marietta, GA 30060 USA
关键词
Cyber-attacks; critical infrastructure; industrial control system; integrity attack; operation technology; information technology; deep learning; neural network; INTRUSION DETECTION;
D O I
10.1109/ACCESS.2020.2992249
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of communication networks and the Internet of Things (IoT) in Industrial Control Systems (ICSs) increases their vulnerability towards cyber-attacks, causing devastating outcomes. Traditional Intrusion Detection Systems (IDSs), which are mainly developed to support information technology systems, count vastly on predefined models and are trained mostly on specific cyber-attacks. Besides, most IDSs do not consider the imbalanced nature of ICS datasets, thereby suffering from low accuracy and high false-positive when being put to use. In this paper, we propose a deep learning model to construct new balanced representations of the imbalanced datasets. The new representations are fed into an ensemble deep learning attack detection model specifically designed for an ICS environment. The proposed attack detection model leverages Deep Neural Network (DNN) and Decision Tree (DT) classifiers to detect cyber-attacks from the new representations. The performance of the proposed model is evaluated based on 10-fold cross-validation on two real ICS datasets. The results show that the proposed method outperforms conventional classifiers, including Random Forest (RF), DNN, and AdaBoost, as well as recent existing models in the literature. The proposed approach is a generalized technique, which can be implemented in existing ICS infrastructures with minimum effort.
引用
收藏
页码:83965 / 83973
页数:9
相关论文
共 45 条
[1]   Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controllers [J].
Alves, Thiago ;
Das, Rishabh ;
Morris, Thomas .
IEEE EMBEDDED SYSTEMS LETTERS, 2018, 10 (03) :99-102
[2]  
[Anonymous], 2018, ARXIV180510451, DOI DOI 10.1016/J.ENG.2019.09.010
[3]  
Antonov S., 2019, 2019 INT C CREAT BUS, DOI [10.1109/CREBUS.2019.8840089, DOI 10.1109/CREBUS.2019.8840089]
[4]   Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies [J].
Befekadu, Getachew K. ;
Gupta, Vijay ;
Antsaklis, Panos J. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (12) :3299-3304
[5]  
Buurma C., 2020, RANS SHUTS GAS COMPR
[6]   Anomaly Detection for Industrial Control Systems Using K-Means and Convolutional Autoencoder [J].
Chang, Chun-Pi ;
Hsu, Wen-Chiao ;
Liao, I-En .
2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2019, :136-141
[7]  
Cheung S., 2007, Proceedings of the SCADA Security Scientific Symposium, P127
[8]  
CISA, 2016, CYB ATT UKR CRIT INF
[9]   Fuzzy pattern tree for edge malware detection and categorization in IoT [J].
Dovom, Ensieh Modiri ;
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Newton, David Ellis ;
Parizi, Reza M. ;
Karimipour, Hadis .
JOURNAL OF SYSTEMS ARCHITECTURE, 2019, 97 :1-7
[10]   Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM networks [J].
Feng, Cheng ;
Li, Tingting ;
Chana, Deeph .
2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2017, :261-272