Applications of deep learning algorithms for Supervisory Control and Data Acquisition intrusion detection system

被引:10
作者
Balla, Asaad [1 ]
Habaebi, Mohamed Hadi [1 ]
Islam, Md. Rafiqul [1 ]
Mubarak, Sinil [1 ]
机构
[1] Int Islamic Univ Malaysia, Dept Elect & Comp Engn, Kuala Lumpur 53100, Malaysia
来源
CLEANER ENGINEERING AND TECHNOLOGY | 2022年 / 9卷
关键词
Deep learning; Intrusion detection system; SCADA; Cyber-physical system; Cyber security; NETWORK; IOT; SECURITY; PRIVACY; MODEL;
D O I
10.1016/j.clet.2022.100532
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Vulnerabilities in the Industrial Control Systems (ICSs) and Supervisory Control and Data Acquisition (SCADA) systems are constantly increasing as these systems incorporate innovative technologies such as the Internet of Things (IoT). As a result of these advancements, the SCADA system became more efficient, simpler to operate, but more exposed to cyber-attacks. A well-planned cyber-attack against SCADA systems can have catastrophic consequences, including physical property damage and even fatalities. To secure these critical infrastructures, security measures should be examined and implemented. These methods could be hardware-based, such as Intrusion Detection Systems (IDS), software-based, or managerial-based. In this paper, we have examined and presented the most recent research on developing robust IDSs using Deep Learning (DL) algorithms, including Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), Stacked Autoencoders (SAE), and Deep Belief Networks (DBN). For each algorithm, prior works have been identified, examined, and described based on their conceptual similarities. A comparison between different IDS-DL models is provided based on their performance metrics. Because data is such a crucial component of the training and evaluation of IDS-DL models, some of the most utilized network datasets in DL are discussed. The challenges facing DL applications in IDS development are also discussed, as well as future research direction and recommendations.
引用
收藏
页数:10
相关论文
共 87 条
[1]   Real-Time Identification of Cyber-Physical Attacks on Water Distribution Systems via Machine Learning-Based Anomaly Detection Techniques [J].
Abokifa, Ahmed A. ;
Haddad, Kelsey ;
Lo, Cynthia ;
Biswas, Pratim .
JOURNAL OF WATER RESOURCES PLANNING AND MANAGEMENT, 2019, 145 (01)
[2]   A Systematic Review of Breast Cancer Detection Using Thermography and Neural Networks [J].
Al Husaini, Mohammed Abdulla Salim ;
Habaebi, Mohamed Hadi ;
Hameed, Shihab A. ;
Islam, Md Rafiqul ;
Gunawan, Teddy Surya .
IEEE ACCESS, 2020, 8 :208922-208937
[3]  
Al-Mhiqani MN, 2018, INT J ADV COMPUT SC, V9, P499
[4]   A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification [J].
Alimi, Oyeniyi Akeem ;
Ouahada, Khmaies ;
Abu-Mahfouz, Adnan M. ;
Rimer, Suvendi ;
Alimi, Kuburat Oyeranti Adefemi .
SUSTAINABILITY, 2021, 13 (17)
[5]   Industrial Control Systems: Cyberattack trends and countermeasures [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Zeadally, Sherali .
COMPUTER COMMUNICATIONS, 2020, 155 :1-8
[6]   Blockchain in Smart Grids: A Review on Different Use Cases [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Rodrigues, Joel J. P. C. ;
Kozlov, Sergei A. .
SENSORS, 2019, 19 (22)
[7]   An intrusion detection system for connected vehicles in smart cities [J].
Aloqaily, Moayad ;
Otoum, Safa ;
Al Ridhawi, Ismaeel ;
Jararweh, Yaser .
AD HOC NETWORKS, 2019, 90
[8]  
[Anonymous], 2010, Int. J. Comput. Appl., DOI DOI 10.5120/758-993
[9]  
Ates Cagatay, 2020, Intelligent and Fuzzy Techniques in Big Data Analytics and Decision Making. Proceedings of the INFUS 2019 Conference. Advances in Intelligent Systems and Computing (AISC 1029), P338, DOI 10.1007/978-3-030-23756-1_42
[10]   Cybersecurity for industrial control systems: A survey [J].
Bhamare, Deval ;
Zolanvari, Maede ;
Erbad, Aiman ;
Jain, Raj ;
Khan, Khaled ;
Meskin, Nader .
COMPUTERS & SECURITY, 2020, 89