Anomaly Detection of Industrial Control Systems Based on Transfer Learning

被引:79
作者
Wang, Weiping [1 ,2 ,3 ]
Wang, Zhaorong [4 ]
Zhou, Zhanfan [5 ]
Deng, Haixia [6 ]
Zhao, Weiliang [5 ]
Wang, Chunyang [1 ,2 ,3 ]
Guo, Yongzhen [7 ,8 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing Key Lab Knowledge Engn Mat Sci, Beijing 100083, Peoples R China
[2] Univ Sci & Technol Beijing, Inst Artificial Intelligence, Beijing 100083, Peoples R China
[3] Univ Sci & Technol Beijing, Shunde Grad Sch, Guangzhou 528399, Peoples R China
[4] Univ Sci & Technol Beijing, Sch Automat & Elect Engn, Beijing 100083, Peoples R China
[5] Univ Sci & Technol Beijing, Sch Mech Engn, Beijing 100083, Peoples R China
[6] Univ Sci & Technol Beijing, Donlinks Sch Econ & Management, Beijing 100083, Peoples R China
[7] Beijing Inst Technol, Sch Automat, Beijing 100081, Peoples R China
[8] China Software Testing Ctr, Beijing 100048, Peoples R China
基金
中国国家自然科学基金;
关键词
anomaly detection; transfer learning; deep learning; Industrial Control System (ICS);
D O I
10.26599/TST.2020.9010041
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Industrial Control Systems (ICSs) are the lifeline of a country. Therefore, the anomaly detection of ICS traffic is an important endeavor. This paper proposes a model based on a deep residual Convolution Neural Network (CNN) to prevent gradient explosion or gradient disappearance and guarantee accuracy. The developed methodology addresses two limitations: most traditional machine learning methods can only detect known network attacks and deep learning algorithms require a long time to train. The utilization of transfer learning under the modification of the existing residual CNN structure guarantees the detection of unknown attacks. One-dimensional ICS flow data are converted into two-dimensional grayscale images to take full advantage of the features of CNN. Results show that the proposed method achieves a high score and solves the time problem associated with deep learning model training. The model can give reliable predictions for unknown or differently distributed abnormal data through short-term training. Thus, the proposed model ensures the safety of ICSs and verifies the feasibility of transfer learning for ICS anomaly detection.
引用
收藏
页码:821 / 832
页数:12
相关论文
共 29 条
[1]  
Agarap A.F., 2018, ARXIV180308375V2 CSN
[2]   An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems [J].
Almalawi, Abdulmohsen ;
Yu, Xinghuo ;
Tari, Zahir ;
Fahad, Adil ;
Khalil, Ibrahim .
COMPUTERS & SECURITY, 2014, 46 :94-110
[3]   ResNet and Model Fusion for Automatic Spoofing Detection [J].
Chen, Zhuxin ;
Xie, Zhifeng ;
Zhang, Weibin ;
Xu, Xiangmin .
18TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2017), VOLS 1-6: SITUATED INTERACTION, 2017, :102-106
[4]  
Gao W., 2013, THESIS MISSISSIPPI S
[5]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[6]  
Hurley J., 2012, IEEE International Conference on Communications (ICC 2012), P1069, DOI 10.1109/ICC.2012.6363995
[7]  
Ikram ST, 2017, J KING SAUD UNIV-COM, V29, P462, DOI 10.1016/j.jksuci.2015.12.004
[8]  
Ioffe Sergey, 2015, Proceedings of Machine Learning Research, V37, P448
[9]  
Jie L., 2019, Journal of Tsinghua University (Science and Technology), V59, P523
[10]   Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network [J].
Lai, Yingxu ;
Zhang, Jingwen ;
Liu, Zenghui .
SECURITY AND COMMUNICATION NETWORKS, 2019, 2019