An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems

被引:70
作者
Almalawi, Abdulmohsen [1 ]
Fahad, Adil [2 ]
Tari, Zahir [3 ]
Alamri, Abdullah [4 ]
AlGhamdi, Rayed [1 ]
Zomaya, Albert Y. [5 ]
机构
[1] King Abdulaziz Univ, Sch Comp Sci & Informat Technol, Jeddah 21589, Saudi Arabia
[2] Al Baha Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, Al Bahah 65431, Saudi Arabia
[3] RMIT Univ, Sch Comp Sci & Informat Technol, Melbourne, Vic 3046, Australia
[4] Univ Jeddah, Fac Comp & Informat Technol, Jeddah 21589, Saudi Arabia
[5] Univ Sydney, Ctr Distributed & High Performance Comp, Sch Informat Technol, Sydney, NSW 2006, Australia
关键词
Classification; Clustering; IDS; SCADA Security; MECHANISM;
D O I
10.1109/TIFS.2015.2512522
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Supervisory control and data acquisition (SCADA) systems have become a salient part in controlling critical infrastructures, such as power plants, energy grids, and water distribution systems. In the past decades, these systems were isolated and use proprietary software, operating systems, and protocols. In recent years, SCADA systems have been interfaced with enterprise systems, which therefore exposed them to the vulnerabilities of the Internet and the security threats. Traditional security solutions (e.g., firewalls, antivirus software, and intrusion detection systems) cannot fully protect SCADA systems, because they have different requirements. This paper presents an innovative intrusion detection approach to detect SCADA tailored attacks. This is based on a data-driven clustering technique of process parameters, which automatically identifies the normal and critical states of a given system. Later, it extracts proximity-based detection rules from the identified states for monitoring purposes. The effectiveness of the proposed approach is tested by conducting experiments on eight data sets that consist of process parameters' values. The empirical results demonstrated an average accuracy of 98% in automatically identifying the critical states, while facilitating the monitoring of the SCADA system.
引用
收藏
页码:893 / 906
页数:14
相关论文
共 35 条
[1]   Diagnosis mechanism for accurate monitoring in critical infrastructure protection [J].
Alcaraz, Cristina ;
Lopez, Javier .
COMPUTER STANDARDS & INTERFACES, 2014, 36 (03) :501-512
[2]   WASAM: A dynamic wide-area situational awareness model for critical domains in Smart Grids [J].
Alcaraz, Cristina ;
Lopez, Javier .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 :146-154
[3]  
Almalawi A, 2013, C LOCAL COMPUT NETW, P639, DOI 10.1109/LCN.2013.6761301
[4]   An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems [J].
Almalawi, Abdulmohsen ;
Yu, Xinghuo ;
Tari, Zahir ;
Fahad, Adil ;
Khalil, Ibrahim .
COMPUTERS & SECURITY, 2014, 46 :94-110
[5]  
[Anonymous], THESIS U MILAN MILAN
[6]  
[Anonymous], P INT WORKSH COMPL N
[7]  
[Anonymous], 2008, INTRO INFORM RETRIEV, DOI DOI 10.1017/CBO9780511809071
[8]  
[Anonymous], 2004, MODBUS MESS TCP IP I
[9]  
Arning A., 1996, KDD-96 Proceedings. Second International Conference on Knowledge Discovery and Data Mining, P164
[10]  
Breunig MM, 1999, LECT NOTES ARTIF INT, V1704, P262