On Using Physical Based Intrusion Detection in SCADA Systems

被引:12
作者
Al-Asiri, Majed [1 ]
El-Alfy, El-Sayed M. [1 ]
机构
[1] King Fahd Univ Petr & Minerals, Dhahran 31261, Saudi Arabia
来源
11TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 3RD INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS | 2020年 / 170卷
关键词
Information Security; SCADA; Industrial Control Systems; Cyber Physical Systems (CPS); Industrial Internet of Things (IIoT); Intrusion Detection; Taxonomy; SECURITY;
D O I
10.1016/j.procs.2020.03.007
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion detection in SCADA systems has received increased attention from researchers as connectivity to public networks became a necessity in many industries. The nature and characteristics of SCADA systems call for special considerations and techniques of intrusion detection. Many works have been made in this field, ranging from generic intrusion detection techniques to customized solutions designed specifically for SCADA systems. In the recent years, some works have focused on using physical metrics in addition to the popular network-based and host-based intrusion detection approaches. This paper presents a taxonomy that considers the special features of cyberphysical intrusion detection systems (IDSs) with examples from the literature. Moreover, a case study is presented for a simulated gas pipeline dataset to compare the effectiveness of decision tree classifiers for various categories of features in SCADA systems. The results show that an IDS that uses a combination of physical and network metrics significantly outperforms an IDS that only uses network metrics or physical metrics. (C) 2020 The Authors. Published by Elsevier B.V.
引用
收藏
页码:34 / 42
页数:9
相关论文
共 50 条
  • [21] HML-DS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems
    Khan, Izhar Ahmed
    Pi, Dechang
    Khan, Zaheer Ullah
    Hussain, Yasir
    Nawaz, Asif
    [J]. IEEE ACCESS, 2019, 7 : 89507 - 89521
  • [22] LSTM for SCADA Intrusion Detection
    Gao, Jun
    Gan, Luyun
    Buschendorf, Fabiola
    Zhang, Liao
    Liu, Hua
    Li, Peixue
    Dong, Xiaodai
    Lu, Tao
    [J]. 2019 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2019,
  • [23] State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept
    Carcano, Andrea
    Fovino, Igor Nai
    Masera, Marcelo
    Trombetta, Alberto
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2010, 6027 : 138 - +
  • [24] Security and Intrusion Detection on Critical SCADA Systems for Water Management
    Stoian, I.
    Ignat, S.
    Capatina, D.
    Ghiran, O.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS, 2014,
  • [25] DISTRIBUTED INTRUSION DETECTION SYSTEM FOR SCADA PROTOCOLS
    Fovino, Igor Nai
    Masera, Marcelo
    Guglielmi, Michele
    Carcano, Andrea
    Trombetta, Alberto
    [J]. CRITICAL INFRASTRUCTURE PROTECTION IV, 2010, 342 : 95 - +
  • [26] The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems
    Balla, Asaad
    Habaebi, Mohamed Hadi
    Elsheikh, Elfatih A. A.
    Islam, Md. Rafiqul
    Suliman, F. M.
    [J]. SENSORS, 2023, 23 (02)
  • [27] A cyber-physical model for SCADA system and its intrusion detection
    Sheng, Chuan
    Yao, Yu
    Fu, Qiang
    Yang, Wei
    [J]. COMPUTER NETWORKS, 2021, 185
  • [28] Deep Learning Based Distributed Intrusion Detection in Secure Cyber Physical Systems
    Ramadevi, P.
    Baluprithviraj, K. N.
    Pillai, V. Ayyem
    Subramaniam, Kamalraj
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03) : 2067 - 2081
  • [29] Multidimensional Intrusion Detection System for IEC 61850-Based SCADA Networks
    Yang, Yi
    Xu, Hai-Qing
    Gao, Lei
    Yuan, Yu-Bo
    McLaughlin, Kieran
    Sezer, Sakir
    [J]. IEEE TRANSACTIONS ON POWER DELIVERY, 2017, 32 (02) : 1068 - 1078
  • [30] Intrusion Detection in Cyber Physical Systems Based on Process Modelling
    Holczer, Tamas
    Gazdag, Andras
    Miru, Gyorgy
    [J]. PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), 2016, : 127 - 135