New Approach to Determine DDoS Attack Patterns on SCADA System Using Machine Learning

被引:20
作者
Alhaidari, Fahd A. [1 ]
Al-Dahasi, Ezaz Mohammed [1 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, PO 1982, Dammam, Saudi Arabia
来源
2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS) | 2019年
关键词
SCADA; Cybersecurity; Denial of Service Attack; DoS; DDoS; Cyberattack; Simulation; Computer Network Attack;
D O I
10.1109/iccisci.2019.8716432
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the importance of Supervisory Control and Data Acquisition (SCADA) systems has grown for many industries around the world. These systems are controlling many vital infrastructures such as grids of power, plants, and water treatment systems. In fact, nowadays SCADA systems cannot be isolated from the public and thus being more vulnerable and exposed to many malicious attacks. Several studies have reviewed the latest developments in cyber-security risks for SCADA systems and found that many factors are responsible for increasing the amount and the level of risks on modern control systems. Among such factors are the network architecture and the reliance on standard technologies that have known vulnerabilities. In this paper, we attempt to improve a framework of SCADA system against Distributed Denial of Service (DDoS) attacks using three machine learning algorithms (i)J48; (ii) Naive Bayes; (iii) Random Forest to determine the attack patterns. These algorithms were trained and evaluated on KDDCup'99 dataset. The preprocessing phase of the dataset was conducted based on the goal of the paper and the obtained results showed that the best classification is obtained using Random Forest classifier (RF) with 99.99% accuracy rate, while Naive Bayes classifier has the lowest accuracy rate of 97.74%.
引用
收藏
页码:541 / 546
页数:6
相关论文
共 30 条
  • [11] Decision trees
    de Ville, Barry
    [J]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2013, 5 (06): : 448 - 455
  • [12] Dong X., 2015, Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, P61
  • [13] Gordon R.J., 2017, J INFORM WARFARE, V16, P49
  • [14] Hentea Mariana, 2008, Interdisciplinary Journal of Information, Knowledge, and Management, V3, P73
  • [15] Kamboj P, 2017, 2017 4TH IEEE UTTAR PRADESH SECTION INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ELECTRONICS (UPCON), P675, DOI 10.1109/UPCON.2017.8251130
  • [16] A survey of cyber security management in industrial control systems
    Knowles, William
    Prince, Daniel
    Hutchison, David
    Disso, Jules Ferdinand Pagna
    Jones, Kevin
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 9 : 52 - 80
  • [17] Lakshminarasimman S, 2017, 2017 FOURTH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN)
  • [18] Li Chao, 2018, Shuichanxue Zazhi, V31, P1
  • [19] Markovic B, 2013, LECT NOTES COMPUT SC, V8082, P591, DOI 10.1007/978-3-642-40585-3_74
  • [20] Assessing and augmenting SCADA cyber security: A survey of techniques
    Nazir, Sajid
    Patel, Shushma
    Patel, Dilip
    [J]. COMPUTERS & SECURITY, 2017, 70 : 436 - 454