Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things

被引:251
作者
Zolanvari, Maede [1 ]
Teixeira, Marcio A. [2 ]
Gupta, Lav [1 ]
Khan, Khaled M. [3 ]
Jain, Raj [1 ]
机构
[1] Washington Univ, Dept Comp Sci & Engn, St Louis, MO 63130 USA
[2] Fed Inst Educ Sci Technol Sao Paulo, BR-01109010 Sao Paulo, Brazil
[3] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
基金
巴西圣保罗研究基金会;
关键词
Cyber attack; Industrial Internet of Things (IIoT); intrusion detection; machine learning (ML); network security; supervisory control and data acquisition (SCADA); vulnerability assessment;
D O I
10.1109/JIOT.2019.2912022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is critical to secure the Industrial Internet of Things (IIoT) devices because of potentially devastating consequences in case of an attack. Machine learning (ML) and big data analytics are the two powerful leverages for analyzing and securing the Internet of Things (IoT) technology. By extension, these techniques can help improve the security of the IIoT systems as well. In this paper, we first present common IIoT protocols and their associated vulnerabilities. Then, we run a cyber-vulnerability assessment and discuss the utilization of ML in countering these susceptibilities. Following that, a literature review of the available intrusion detection solutions using ML models is presented. Finally, we discuss our case study, which includes details of a real-world testbed that we have built to conduct cyber-attacks and to design an intrusion detection system (IDS). We deploy backdoor, command injection, and Structured Query Language (SQL) injection attacks against the system and demonstrate how a ML-based anomaly detection system can perform well in detecting these attacks. We have evaluated the performance through representative metrics to have a fair point of view on the effectiveness of the methods.
引用
收藏
页码:6822 / 6834
页数:13
相关论文
共 32 条
[1]   Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controllers [J].
Alves, Thiago ;
Das, Rishabh ;
Morris, Thomas .
IEEE EMBEDDED SYSTEMS LETTERS, 2018, 10 (03) :99-102
[2]  
[Anonymous], VULNERABILITIES IND
[3]  
[Anonymous], 2018, arXiv preprint arXiv:1801.01489
[4]  
[Anonymous], 2013, P 1 INT S ICS SCADA
[5]  
[Anonymous], EURASIP J INF SECURI
[6]  
[Anonymous], P IEEE INT TEST C IT
[7]  
[Anonymous], SCADA COMMUNICATION
[8]  
ANTONIADIS A, 2014, P 5 INT GREEN COMP C, P1
[9]  
Bartman T, 2016, 2016 69th Annual Conference for Protective Relay Engineers (CPRE), P1, DOI [DOI 10.1109/CPRE.2016.7914914, 10.1109/CPRE.2016.7914914]
[10]   An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications [J].
Beaver, Justin M. ;
Borges-Hink, Raymond C. ;
Buckner, Mark. A. .
2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2, 2013, :54-59