New Approach to Determine DDoS Attack Patterns on SCADA System Using Machine Learning

被引:20
作者
Alhaidari, Fahd A. [1 ]
Al-Dahasi, Ezaz Mohammed [1 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, PO 1982, Dammam, Saudi Arabia
来源
2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS) | 2019年
关键词
SCADA; Cybersecurity; Denial of Service Attack; DoS; DDoS; Cyberattack; Simulation; Computer Network Attack;
D O I
10.1109/iccisci.2019.8716432
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the importance of Supervisory Control and Data Acquisition (SCADA) systems has grown for many industries around the world. These systems are controlling many vital infrastructures such as grids of power, plants, and water treatment systems. In fact, nowadays SCADA systems cannot be isolated from the public and thus being more vulnerable and exposed to many malicious attacks. Several studies have reviewed the latest developments in cyber-security risks for SCADA systems and found that many factors are responsible for increasing the amount and the level of risks on modern control systems. Among such factors are the network architecture and the reliance on standard technologies that have known vulnerabilities. In this paper, we attempt to improve a framework of SCADA system against Distributed Denial of Service (DDoS) attacks using three machine learning algorithms (i)J48; (ii) Naive Bayes; (iii) Random Forest to determine the attack patterns. These algorithms were trained and evaluated on KDDCup'99 dataset. The preprocessing phase of the dataset was conducted based on the goal of the paper and the obtained results showed that the best classification is obtained using Random Forest classifier (RF) with 99.99% accuracy rate, while Naive Bayes classifier has the lowest accuracy rate of 97.74%.
引用
收藏
页码:541 / 546
页数:6
相关论文
共 30 条
  • [1] Abrams M., 2008, Malicious control system cyber security attack case study-maroochy water services, australia
  • [2] An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
    Almalawi, Abdulmohsen
    Yu, Xinghuo
    Tari, Zahir
    Fahad, Adil
    Khalil, Ibrahim
    [J]. COMPUTERS & SECURITY, 2014, 46 : 94 - 110
  • [3] Author M. S. H. L., DISTR COMP ART INT 1, V474, P33
  • [4] Network and power-grid co-simulation framework for Smart Grid wide-area monitoring networks
    Bhor, Dhananjay
    Angappan, Kavinkadhirselvan
    Sivalingam, Krishna M.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 59 : 274 - 284
  • [5] Random forests
    Breiman, L
    [J]. MACHINE LEARNING, 2001, 45 (01) : 5 - 32
  • [6] Byres E., 2004, P VDE K, V116, P213
  • [7] A review of cyber security risk assessment methods for SCADA systems
    Cherdantseva, Yulia
    Burnap, Pete
    Blyth, Andrew
    Eden, Peter
    Jones, Kevin
    Soulsby, Hugh
    Stoddart, Kristan
    [J]. COMPUTERS & SECURITY, 2016, 56 : 1 - 27
  • [8] Cui Y, 2018, INTERSPEECH, P2017
  • [9] Dalgleish T., 2007, J EXPT PSYCHOL GEN
  • [10] Daneels A., 1999, What is SCADA?