Skip to main content
Erschienen in: Programming and Computer Software 4/2023

01.08.2023

Detection of Network Attacks in a Heterogeneous Industrial Network Based on Machine Learning

verfasst von: A. M. Vulfin

Erschienen in: Programming and Computer Software | Ausgabe 4/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Issues of improving algorithms for detecting network attacks in a heterogeneous industrial Internet of Things network based on machine learning technologies for subsequent integration with subsystems of a security operation center are considered. A block diagram of a network attack detection system and an algorithm for the intelligent analysis of network traffic parameters in the task of detecting malicious network activity are developed. Variants of constructing ensembles of classifiers based on machine learning models and heterogeneous neural network models are analyzed. The F1 score for test samples from publicly available datasets of labeled network traffic is as high as 96%. The possibility of embedding the proposed models into software and hardware modules is discussed. A virtual testbed for assessing the effectiveness of machine learning models for detecting network attacks is developed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Moore, B., Gartner’s top 10 IoT tech trends, IT Brief. https://itbrief.com.au/story/gartner-s-top-10-iot-tech-trends. Accessed December 5, 2021. Moore, B., Gartner’s top 10 IoT tech trends, IT Brief. https://​itbrief.​com.​au/​story/​gartner-s-top-10-iot-tech-trends.​ Accessed December 5, 2021.
2.
Zurück zum Zitat Topical Cyber Threats: Q4 2020. Positive Technologies report. https://www.ptsecurity.com/ru-ru/research/analytics/cybersecurity-threatscape-2020-q4/. Accessed December 5, 2021. Topical Cyber Threats: Q4 2020. Positive Technologies report. https://​www.​ptsecurity.​com/​ru-ru/​research/​analytics/​cybersecurity-threatscape-2020-q4/​.​ Accessed December 5, 2021.
3.
Zurück zum Zitat Threat landscape for industrial automation systems. 2019 year. Kaspersky ICS CERT [Online]. https://ics-cert.kaspersky.ru/reports/2020/04/24/threat-landscape-for-industrial-automation-systems-2019-report-at-a-glance/. Accessed December 5, 2021. Threat landscape for industrial automation systems. 2019 year. Kaspersky ICS CERT [Online]. https://​ics-cert.​kaspersky.​ru/​reports/​2020/​04/​24/​threat-landscape-for-industrial-automation-systems-2019-report-at-a-glance/​.​ Accessed December 5, 2021.
4.
Zurück zum Zitat Cecil, A., A summary of network traffic monitoring and analysis techniques. https://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html. Accessed December 5, 2021. Cecil, A., A summary of network traffic monitoring and analysis techniques. https://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html. Accessed December 5, 2021.
5.
Zurück zum Zitat Gaifulina, D.A. and Kotenko, I.V., Application of deep learning methods in cybersecurity tasks, Voprosy kiberbezopasnosti, 2020, no. 3, pp. 76–86. Gaifulina, D.A. and Kotenko, I.V., Application of deep learning methods in cybersecurity tasks, Voprosy kiberbezopasnosti, 2020, no. 3, pp. 76–86.
6.
Zurück zum Zitat Monshizadeh M. et al., Performance evaluation of a combined anomaly detection platform, IEEE Access, 2019, vol. 7, pp. 100964–100978.CrossRef Monshizadeh M. et al., Performance evaluation of a combined anomaly detection platform, IEEE Access, 2019, vol. 7, pp. 100964–100978.CrossRef
7.
Zurück zum Zitat Moustafa N. et al., Collaborative anomaly detection framework for handling big data of cloud computing, 2017 Military Communications and Information Systems Conference (MilCIS). IEEE, 2017, pp. 1–6. Moustafa N. et al., Collaborative anomaly detection framework for handling big data of cloud computing, 2017 Military Communications and Information Systems Conference (MilCIS). IEEE, 2017, pp. 1–6.
8.
Zurück zum Zitat Ten, C.W., Manimaran G., and Liu, C.C., Cybersecurity for critical infrastructures: Attack and defense modeling, IEEE Trans. Syst., Man,Cybernetics Part A: Syst. and Humans, 2010, vol. 40, no. 4, pp. 853–865.CrossRef Ten, C.W., Manimaran G., and Liu, C.C., Cybersecurity for critical infrastructures: Attack and defense modeling, IEEE Trans. Syst., Man,Cybernetics Part A: Syst. and Humans, 2010, vol. 40, no. 4, pp. 853–865.CrossRef
9.
Zurück zum Zitat Ten, C.W., Hong, J., and Liu, C.C., Anomaly detection for cybersecurity of the substations, IEEE Trans. Smart Grid, 2011, vol. 2, no. 4, pp. 865–873.CrossRef Ten, C.W., Hong, J., and Liu, C.C., Anomaly detection for cybersecurity of the substations, IEEE Trans. Smart Grid, 2011, vol. 2, no. 4, pp. 865–873.CrossRef
10.
Zurück zum Zitat Alrashdi, I. et al., Ad-IoT: Anomaly detection of IoT cyberattacks in smart city using machine learning, 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2019, pp. 305–310. Alrashdi, I. et al., Ad-IoT: Anomaly detection of IoT cyberattacks in smart city using machine learning, 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2019, pp. 305–310.
11.
Zurück zum Zitat Kiss, I. et al., Data clustering-based anomaly detection in industrial control systems, 2014 IEEE 10th International Conference on Intelligent Computer Communication and Processing (ICCP). IEEE, 2014, pp. 275–281. Kiss, I. et al., Data clustering-based anomaly detection in industrial control systems, 2014 IEEE 10th International Conference on Intelligent Computer Communication and Processing (ICCP). IEEE, 2014, pp. 275–281.
12.
Zurück zum Zitat Cruz, T. et al., A cybersecurity detection framework for supervisory control and data acquisition systems, IEEE Trans. Industr. Inform., 2016, vol. 12, no. 6, pp. 2236–2246.CrossRef Cruz, T. et al., A cybersecurity detection framework for supervisory control and data acquisition systems, IEEE Trans. Industr. Inform., 2016, vol. 12, no. 6, pp. 2236–2246.CrossRef
13.
Zurück zum Zitat Tartakovsky, A.G., Polunchenko, A.S., and Sokolov, G., Efficient computer network anomaly detection by changepoint detection methods, IEEE J. Selected Topics Signal Process., 2012, vol. 7, no. 1, pp. 4–11.CrossRef Tartakovsky, A.G., Polunchenko, A.S., and Sokolov, G., Efficient computer network anomaly detection by changepoint detection methods, IEEE J. Selected Topics Signal Process., 2012, vol. 7, no. 1, pp. 4–11.CrossRef
14.
Zurück zum Zitat Keshk, M. et al., An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems, IEEE Trans. Sustainable Comput., 2019, vol. 6, no. 1, pp. 66–79.CrossRef Keshk, M. et al., An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems, IEEE Trans. Sustainable Comput., 2019, vol. 6, no. 1, pp. 66–79.CrossRef
15.
Zurück zum Zitat Gómez, Á.L.P. et al., On the generation of anomaly detection datasets in industrial control systems, IEEE Access, 2019, vol. 7, pp. 177460–177473.CrossRef Gómez, Á.L.P. et al., On the generation of anomaly detection datasets in industrial control systems, IEEE Access, 2019, vol. 7, pp. 177460–177473.CrossRef
16.
Zurück zum Zitat Tavallaee, M. et al., A detailed analysis of the KDD CUP 99 data set, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, IEEE, 2009, pp. 1–6. Tavallaee, M. et al., A detailed analysis of the KDD CUP 99 data set, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, IEEE, 2009, pp. 1–6.
17.
Zurück zum Zitat Sharafaldin I., Lashkari A.H., Ghorbani A.A., Toward generating a new intrusion detection dataset and intrusion traffic characterization, ICISSp, 2018, vol. 1, pp. 108–116. Sharafaldin I., Lashkari A.H., Ghorbani A.A., Toward generating a new intrusion detection dataset and intrusion traffic characterization, ICISSp, 2018, vol. 1, pp. 108–116.
18.
Zurück zum Zitat Moustafa, N., and Slay, J., UNSW-NB15: a Comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), 2015 Military Communications and Information Systems Conference (MilCIS), IEEE, 2015, pp. 1–6. Moustafa, N., and Slay, J., UNSW-NB15: a Comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), 2015 Military Communications and Information Systems Conference (MilCIS), IEEE, 2015, pp. 1–6.
19.
Zurück zum Zitat Teixeira, M.A. et al., SCADA system testbed for cybersecurity research using machine learning approach, Future Internet. 2018, vol. 10, no. 8, p. 76.CrossRef Teixeira, M.A. et al., SCADA system testbed for cybersecurity research using machine learning approach, Future Internet. 2018, vol. 10, no. 8, p. 76.CrossRef
20.
Zurück zum Zitat Miciolino, E.E. et al., Communications network analysis in a SCADA system testbed under cyber-attacks, 2015 23rd Telecommunications Forum Telfor (TELFOR), IEEE, 2015, pp. 341–344. Miciolino, E.E. et al., Communications network analysis in a SCADA system testbed under cyber-attacks, 2015 23rd Telecommunications Forum Telfor (TELFOR), IEEE, 2015, pp. 341–344.
21.
Zurück zum Zitat Sapozhnikova, M.U., Nikonov, A.V., and Vulfin, A.M., Intrusion detection system based on data mining techniques for industrial networks, 2018 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM), IEEE, 2018, pp. 1–5. Sapozhnikova, M.U., Nikonov, A.V., and Vulfin, A.M., Intrusion detection system based on data mining techniques for industrial networks, 2018 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM), IEEE, 2018, pp. 1–5.
22.
Zurück zum Zitat Vulfin, A.M. et al., Network traffic analysis based on machine learning methods, Journal of Physics: Conference Series. IOP Publishing, 2021, vol. 2001, no. 1, pp. 012017. Vulfin, A.M. et al., Network traffic analysis based on machine learning methods, Journal of Physics: Conference Series. IOP Publishing, 2021, vol. 2001, no. 1, pp. 012017.
23.
Zurück zum Zitat Gurin M.A. et al., Intrusion detection system on the basis of data mining algorithms in the industrial network, CEUR Workshop Proceedings, 2019, pp. 553–565. Gurin M.A. et al., Intrusion detection system on the basis of data mining algorithms in the industrial network, CEUR Workshop Proceedings, 2019, pp. 553–565.
24.
Zurück zum Zitat Vulfin, A.M. et al., Algorithms for detecting network attacks in an enterprise industrial network based on data mining algorithms, J. Phys., Conf. Ser. IOP Publishing, 2021, vol. 2001, no. 1, p. 012004. Vulfin, A.M. et al., Algorithms for detecting network attacks in an enterprise industrial network based on data mining algorithms, J. Phys., Conf. Ser. IOP Publishing, 2021, vol. 2001, no. 1, p. 012004.
25.
Zurück zum Zitat Almomani, I., Al-Kasasbeh, B., and Al-Akhras, M., WSN-DS: A dataset for intrusion detection systems in wireless sensor networks, J. Sensors, 2016, vol. 2016. Almomani, I., Al-Kasasbeh, B., and Al-Akhras, M., WSN-DS: A dataset for intrusion detection systems in wireless sensor networks, J. Sensors, 2016, vol. 2016.
26.
Zurück zum Zitat Vasilyev, V.I. et al., System of attacks detection in wireless sensor networks of Industrial Internet of Things, Trudy ISA RAN, 2019, vol. 69, no. 4, pp. 70–78. Vasilyev, V.I. et al., System of attacks detection in wireless sensor networks of Industrial Internet of Things, Trudy ISA RAN, 2019, vol. 69, no. 4, pp. 70–78.
27.
Zurück zum Zitat Goryunov, M.N., Matskevich, A.G., and Rybolovlev, D.A., Synthesis of a machine learning model for detecting computer attacks based on the CICIDS2017 dataset, Trudy ISP RAN, 2020, vol. 32, no. 5, pp. 81–93. Goryunov, M.N., Matskevich, A.G., and Rybolovlev, D.A., Synthesis of a machine learning model for detecting computer attacks based on the CICIDS2017 dataset, Trudy ISP RAN, 2020, vol. 32, no. 5, pp. 81–93.
28.
Zurück zum Zitat Kotsiantis, S. B. et al., Supervised machine learning: A review of classification techniques, Emerging artif. Intell. Appl. Comput. Eng., 2007. vol. 160. no. 1, pp. 3–24.MathSciNet Kotsiantis, S. B. et al., Supervised machine learning: A review of classification techniques, Emerging artif. Intell. Appl. Comput. Eng., 2007. vol. 160. no. 1, pp. 3–24.MathSciNet
30.
Zurück zum Zitat Tobarra, L. et al., A Cybersecurity Experience with Cloud Virtual-Remote Laboratories, Multidisciplinary Digital Publishing Institute Proceedings, 2019, vol. 31, no. 1, p. 3. Tobarra, L. et al., A Cybersecurity Experience with Cloud Virtual-Remote Laboratories, Multidisciplinary Digital Publishing Institute Proceedings, 2019, vol. 31, no. 1, p. 3.
Metadaten
Titel
Detection of Network Attacks in a Heterogeneous Industrial Network Based on Machine Learning
verfasst von
A. M. Vulfin
Publikationsdatum
01.08.2023
Verlag
Pleiades Publishing
Erschienen in
Programming and Computer Software / Ausgabe 4/2023
Print ISSN: 0361-7688
Elektronische ISSN: 1608-3261
DOI
https://doi.org/10.1134/S0361768823040126

Weitere Artikel der Ausgabe 4/2023

Programming and Computer Software 4/2023 Zur Ausgabe

Premium Partner