Evaluation of Machine Learning Algorithms for Detection of Malicious Traffic in SCADA Network

被引:0
作者
L. Rajesh
Penke Satyanarayana
机构
[1] Koneru Lakshmaiah Education Foundation,Department of ECE
[2] K L Deemed to be University,undefined
来源
Journal of Electrical Engineering & Technology | 2022年 / 17卷
关键词
Intrusion detection system; Process control system; SCADA system; Machine learning; Network security; Sensor telemetry; Monitoring; Soft computing with sensor data;
D O I
暂无
中图分类号
学科分类号
摘要
Industrial Process Control Systems (IPCS) like Supervisory Control and Data Acquisition (SCADA) systems are more vulnerable to cyber-attacks. Detection of malicious traffic in IPCS-SCADA network using machine learning techniques is one of the security enhancement methods of Industrial Process Control Systems. The existing network intrusion detection methods used limited old data sets and little addressed for IPCS-SCADA specific network. In this paper we evaluated machine learning algorithms with and with out filtering and sampling techniques for intrusion detection in IPCS-SCADA network. In this work, we generated own data set with network traffic contains both normal and attack data using a real time SCADA test bed. Next we applied feature extraction techniques Chi-Square, ANOVA and Least Absolute Shrinkage and Selection Operator (LASSO) to reduce the feature set dimensionality. We applied SVM variant Synthetic Minority Oversampling Technique (SVMSMOTE) for handling this imbalance data set. After that we used four Machine Learning (ML) algorithms like Random Forest (RF), Support Vector Machine (SVM), K-nearest neighbors (KNN) and Naive Bayes (NB) and calculated various performance metrics like Accuracy, Matthews correlation coefficient (MCC), recall, F1-score, FNR and ROC. We evaluated the performance of these ML algorithms with (a) ML techniques only (b) ML techniques with feature selection methods (c) ML techniques with SVMSMOTE only (d) ML techniques with both feature selection methods and SVMSMOTE. We concluded from the results that SVM algorithm with filtering and SVMSMOTE technique outperforms compared to other three machine learning algorithms, with ROC  value of 99.96%.
引用
收藏
页码:913 / 928
页数:15
相关论文
共 50 条
  • [21] Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT
    Rose, Joseph R.
    Swann, Matthew
    Bendiab, Gueltoum
    Shiaeles, Stavros
    Kolokotronis, Nicholas
    PROCEEDINGS OF THE 2021 IEEE 7TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2021): ACCELERATING NETWORK SOFTWARIZATION IN THE COGNITIVE AGE, 2021, : 409 - 415
  • [22] Analysis of NetFlow Features' Importance in Malicious Network Traffic Detection
    Campazas-Vega, Adrian
    Samuel Crespo-Martinez, Ignacio
    Manuel Guerrero-Higueras, Angel
    Alvarez-Aparicio, Claudia
    Matellan, Vicente
    14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS AND 12TH INTERNATIONAL CONFERENCE ON EUROPEAN TRANSNATIONAL EDUCATIONAL (CISIS 2021 AND ICEUTE 2021), 2022, 1400 : 52 - 61
  • [23] Detection of Malicious Software by Analyzing Distinct Artifacts Using Machine Learning and Deep Learning Algorithms
    Ashik, Mathew
    Jyothish, A.
    Anandaram, S.
    Vinod, P.
    Mercaldo, Francesco
    Martinelli, Fabio
    Santone, Antonella
    ELECTRONICS, 2021, 10 (14)
  • [24] CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
    Shafiq, Muhammad
    Tian, Zhihong
    Bashir, Ali Kashif
    Du, Xiaojiang
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05): : 3242 - 3254
  • [25] Machine learning algorithms performance evaluation in traffic flow prediction
    Ramchandra, Nazirkar Reshma
    Rajabhushanam, C.
    MATERIALS TODAY-PROCEEDINGS, 2022, 51 : 1046 - 1050
  • [26] Feature Entropy Estimation (FEE) for Malicious IoT Traffic and Detection Using Machine Learning
    Diwan, Tarun Dhar
    Choubey, Siddartha
    Hota, H. S.
    Goyal, S. B.
    Jamal, Sajjad Shaukat
    Shukla, Piyush Kumar
    Tiwari, Basant
    MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [27] Classification of Malicious Traffic Using TensorFlow Machine Learning
    Chou, Li-Der
    Tseng, Chia-Wei
    Lai, Meng-Sheng
    Chen, Wei-Yu
    Chen, Kuo-Chung
    Yen, Chia-Kuan
    Ou, Tsung-Fu
    Tsai, Wei-Hsiang
    Chiu, Yi-Hsuan
    2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2018, : 186 - 190
  • [28] Comparison of Machine Learning Algorithms for Detection of Network Intrusions
    Li, Zhida
    Batta, Prerna
    Trajkovic, Ljiljana
    2018 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2018, : 4242 - 4247
  • [29] An Effective Feature Selection Algorithm for Machine Learning-based Malicious Traffic Detection
    Fei, Chao
    Xia, Nian
    Tsai, Pang-Wei
    Lu, Yang
    Pan, Xiaonan
    Gong, Junli
    2024 19TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY, ASIAJCIS 2024, 2024, : 91 - 98
  • [30] Omni SCADA Intrusion Detection Using Deep Learning Algorithms
    Gao, Jun
    Gan, Luyun
    Buschendorf, Fabiola
    Zhang, Liao
    Liu, Hua
    Li, Peixue
    Dong, Xiaodai
    Lu, Tao
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) : 951 - 961