Skip to main content

2020 | OriginalPaper | Buchkapitel

SSO-IF: An Outlier Detection Approach for Intrusion Detection in SCADA Systems

verfasst von : P. S. Chaithanya, S. Priyanga, S. Pravinraj, V. S. Shankar Sriram

Erschienen in: Inventive Communication and Computational Technologies

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Supervisory Control and Data Acquisition (SCADA) systems play a prominent role in monitoring and controlling the Critical Infrastructures (CIs) such as water distribution, nuclear plants, and chemical industries. On the other hand, SCADA systems are highly exposed to new vulnerabilities as it highly relies on the internet. Machine learning approaches have been employed to detect the cyberattacks injected by the attackers in CIs. However, those approaches failed to protect the CIs against the ever-advancing nature of cyberattacks. This work presents Salp Swarm Optimization-based Isolation Forest (SSO-IF) to build an efficient SCADA intrusion detection system, and the experiments were carried out using power system dataset from Mississippi State University. The performance of SSO-IF was validated over the state-of-the-art intrusion detection techniques in terms of classification accuracy and detection rate.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Goh J, Adepu S, Tan M, Lee ZS (2017) Anomaly detection in cyber physical systems using recurrent neural networks. In: Proceedings of IEEE international symposium high assurance systems engineering, pp 140–145 Goh J, Adepu S, Tan M, Lee ZS (2017) Anomaly detection in cyber physical systems using recurrent neural networks. In: Proceedings of IEEE international symposium high assurance systems engineering, pp 140–145
2.
Zurück zum Zitat Zhang J, Gan S, Liu X, Zhu P (2016) Intrusion detection in SCADA systems by traffic periodicity and telemetry analysis. In: Proceedings—IEEE symposium on computers communications, pp 318–325 Zhang J, Gan S, Liu X, Zhu P (2016) Intrusion detection in SCADA systems by traffic periodicity and telemetry analysis. In: Proceedings—IEEE symposium on computers communications, pp 318–325
3.
Zurück zum Zitat Ginter A (2017) The top 20 cyber attacks against industrial control systems, pp 2–4 Ginter A (2017) The top 20 cyber attacks against industrial control systems, pp 2–4
4.
Zurück zum Zitat Almalawi A, Yu X, Tari Z, Fahad A, Khalil I (2014) An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. Comput Secur 46:94–110CrossRef Almalawi A, Yu X, Tari Z, Fahad A, Khalil I (2014) An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. Comput Secur 46:94–110CrossRef
5.
Zurück zum Zitat Maglaras LA, Jiang J (2014) Intrusion detection in SCADA systems using machine learning techniques. In: Proceedings of 2014 science and information conference, SAI 2014, pp 626–631 Maglaras LA, Jiang J (2014) Intrusion detection in SCADA systems using machine learning techniques. In: Proceedings of 2014 science and information conference, SAI 2014, pp 626–631
6.
Zurück zum Zitat Liu FT, Ting KM (2018) Isolation forest. In: Eighth IEE international conference data mining, 2009 Liu FT, Ting KM (2018) Isolation forest. In: Eighth IEE international conference data mining, 2009
7.
Zurück zum Zitat Puggini L, McLoone S (2018) An enhanced variable selection and isolation forest based methodology for anomaly detection with OES data. Eng Appl Artif Intell 2017 67:126–135 Puggini L, McLoone S (2018) An enhanced variable selection and isolation forest based methodology for anomaly detection with OES data. Eng Appl Artif Intell 2017 67:126–135
8.
Zurück zum Zitat Sun J, Zhong G, Huang K, Dong J (2018) Banzhaf random forests: cooperative game theory based random forests with consistency. Neural Netw 106:20–29CrossRef Sun J, Zhong G, Huang K, Dong J (2018) Banzhaf random forests: cooperative game theory based random forests with consistency. Neural Netw 106:20–29CrossRef
9.
Zurück zum Zitat Maglaras LA, Jiang J, Cruz TJ (2016) Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. J Inf Secur Appl 30:15–26 Maglaras LA, Jiang J, Cruz TJ (2016) Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. J Inf Secur Appl 30:15–26
10.
Zurück zum Zitat Alves T, Morris T (2018) OpenPLC: an IEC 61,131–3 compliant open source industrial controller for cyber security research. Comput Secur 78:364–379CrossRef Alves T, Morris T (2018) OpenPLC: an IEC 61,131–3 compliant open source industrial controller for cyber security research. Comput Secur 78:364–379CrossRef
11.
Zurück zum Zitat Abellán J, Mantas CJ, Castellano JG (2017) A random forest approach using imprecise probabilities. Knowl Syst 134:72–84CrossRef Abellán J, Mantas CJ, Castellano JG (2017) A random forest approach using imprecise probabilities. Knowl Syst 134:72–84CrossRef
12.
Zurück zum Zitat Shirazi SA, Parvandeh S, McKinney BA, Asgharpour A, McLaury BS, Zahedi P (2018) Random forest regression prediction of solid particle erosion in elbows. Powder Technol 338:983–992CrossRef Shirazi SA, Parvandeh S, McKinney BA, Asgharpour A, McLaury BS, Zahedi P (2018) Random forest regression prediction of solid particle erosion in elbows. Powder Technol 338:983–992CrossRef
13.
Zurück zum Zitat Nader P, Honeine P, Beauseroy P (2014) Lp-norms in one-class classification for intrusion detection in SCADA systems. IEEE Trans Ind Inform 10(4):2308–2317CrossRef Nader P, Honeine P, Beauseroy P (2014) Lp-norms in one-class classification for intrusion detection in SCADA systems. IEEE Trans Ind Inform 10(4):2308–2317CrossRef
14.
Zurück zum Zitat Trombetta A, Masera M, Nai Fovino I, Carcano A, Guglielmi M, Coletta A (2011) A multidimensional critical state analysis for detecting intrusions in SCADA systems. IEEE Trans Ind Inform 7(2):179–186 Trombetta A, Masera M, Nai Fovino I, Carcano A, Guglielmi M, Coletta A (2011) A multidimensional critical state analysis for detecting intrusions in SCADA systems. IEEE Trans Ind Inform 7(2):179–186
15.
Zurück zum Zitat Shitharth S, Prince Winston D (2017) An enhanced optimization based algorithm for intrusion detection in SCADA network. Comput Secur 70:16–26 Shitharth S, Prince Winston D (2017) An enhanced optimization based algorithm for intrusion detection in SCADA network. Comput Secur 70:16–26
16.
Zurück zum Zitat Mirjalili S, Gandomi AH, Mirjalili SZ, Saremi S, Faris H, Mirjalili SM (2017) Salp swarm algorithm: a bio-inspired optimizer for engineering design problems. Adv Eng Softw 114:163–191CrossRef Mirjalili S, Gandomi AH, Mirjalili SZ, Saremi S, Faris H, Mirjalili SM (2017) Salp swarm algorithm: a bio-inspired optimizer for engineering design problems. Adv Eng Softw 114:163–191CrossRef
17.
Zurück zum Zitat Borges Hink RC, Beaver JM, Buckner MA, Morris T, Adhikari U, Pan S (2014) Machine learning for power system disturbance and cyber-attack discrimination. In: 7th international symposium on resilient control systems, ISRCS Borges Hink RC, Beaver JM, Buckner MA, Morris T, Adhikari U, Pan S (2014) Machine learning for power system disturbance and cyber-attack discrimination. In: 7th international symposium on resilient control systems, ISRCS
Metadaten
Titel
SSO-IF: An Outlier Detection Approach for Intrusion Detection in SCADA Systems
verfasst von
P. S. Chaithanya
S. Priyanga
S. Pravinraj
V. S. Shankar Sriram
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-0146-3_89