Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set

被引:44
作者
Anton, Simon Duque [1 ]
Kanoor, Suneetha [1 ]
Fraunholz, Daniel [1 ]
Schotten, Hans Dieter [1 ]
机构
[1] German Res Ctr Artificial Intelligence, Intelligent Networks Res Grp, Kaiserslautern, Germany
来源
13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018) | 2019年
关键词
Modbus; Machine Learning; Anomaly Detection; Industrial; IT-Security; NETWORK;
D O I
10.1145/3230833.3232818
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the context of the Industrial Internet of Things, communication technology, originally used in home and office environments, is introduced into industrial applications. Commercial off-the-shelf products, as well as unified and well-established communication protocols make this technology easy to integrate and use. Furthermore, productivity is increased in comparison to classic industrial control by making systems easier to manage, set up and configure. Unfortunately, most attack surfaces of home and office environments are introduced into industrial applications as well, which usually have very few security mechanisms in place. Over the last years, several technologies tackling that issue have been researched. In this work, machine learning-based anomaly detection algorithms are employed to find malicious traffic in a synthetically generated data set of Modbus/TCP communication of a fictitious industrial scenario. The applied algorithms are Support Vector Machine (SVM), Random Forest, k-nearest neighbour and k-means clustering. Due to the synthetic data set, supervised learning is possible. Support Vector Machine and k-nearest neighbour perform well with different data sets, while k-nearest neighbour and k-means clustering do not perform satisfactorily.
引用
收藏
页数:9
相关论文
共 35 条
[1]  
Alsabti K., 1997, ELECT ENG COMPUTER S
[2]   AN INTRODUCTION TO KERNEL AND NEAREST-NEIGHBOR NONPARAMETRIC REGRESSION [J].
ALTMAN, NS .
AMERICAN STATISTICIAN, 1992, 46 (03) :175-185
[3]  
[Anonymous], 2009, 2009 IEEE C EMERGING, DOI [DOI 10.1109/ETFA.2009.5347134, 10.1109/ETFA.2009.5347134]
[4]  
[Anonymous], MELISSA AUTOMATED DE
[5]  
[Anonymous], 13 C TEL MED INT TEC
[6]  
[Anonymous], 2017, P 9 CENTR EUR WORKSH
[7]  
[Anonymous], J DIGITAL FORENSICS
[8]  
[Anonymous], MACHINE LEARNING CYB
[9]  
ANTN S. D., Proc. 2017 IEEE Conf. on Application, Information, and Network Security, DOI [https://doi.org/10.1109/AINS.2017.8270432, DOI 10.1109/AINS.2017.8270432]
[10]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336