SSO-IF: An Outlier Detection Approach for Intrusion Detection in SCADA Systems

被引:5
|
作者
Chaithanya, P. S. [1 ]
Priyanga, S. [1 ]
Pravinraj, S. [1 ]
Sriram, V. S. Shankar [1 ]
机构
[1] SASTRA Deemed Univ, Ctr Informat Super Highway CISH, Sch Comp, Thanjavur 613401, Tamil Nadu, India
关键词
SCADA; Intrusion detection system; Isolation forest; Salp swarm optimization; ALGORITHM;
D O I
10.1007/978-981-15-0146-3_89
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervisory Control and Data Acquisition (SCADA) systems play a prominent role in monitoring and controlling the Critical Infrastructures (CIs) such as water distribution, nuclear plants, and chemical industries. On the other hand, SCADA systems are highly exposed to new vulnerabilities as it highly relies on the internet. Machine learning approaches have been employed to detect the cyberattacks injected by the attackers in CIs. However, those approaches failed to protect the CIs against the ever-advancing nature of cyberattacks. This work presents Salp Swarm Optimization-based Isolation Forest (SSO-IF) to build an efficient SCADA intrusion detection system, and the experiments were carried out using power system dataset from Mississippi State University. The performance of SSO-IF was validated over the state-of-the-art intrusion detection techniques in terms of classification accuracy and detection rate.
引用
收藏
页码:921 / 929
页数:9
相关论文
共 50 条
  • [1] Robust Network Intrusion Detection Systems for Outlier Detection
    Desai, Rohan
    Venkatesh, T. G.
    2022 IEEE 27TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2022, : 140 - 146
  • [2] A novel outlier detection scheme for network intrusion detection systems
    Prakobphol, Komsit
    Zhan, Justin
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 555 - 560
  • [3] Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach
    Jabez, J.
    Muthukumar, B.
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 338 - 346
  • [4] A Survey of SCADA-Specific Intrusion Detection Systems
    Huang, Wei
    Chen, Hao
    Guo, Ya-Juan
    Guo, Jing
    Jiang, Hai-Tao
    INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND AUTOMATION (ICCEA 2014), 2014, : 66 - 72
  • [5] Integrated OCSVM mechanism for intrusion detection in SCADA systems
    Maglaras, Leandros A.
    Jiang, Jianmin
    Cruz, Tiago
    ELECTRONICS LETTERS, 2014, 50 (25) : 1935 - 1936
  • [6] Supervised learning based intrusion detection for SCADA systems
    Alimi, Oyeniyi Akeem
    Ouahada, Khmaies
    Abu-Mahfouz, Adnan M.
    Rimer, Suvendi
    Alimi, Kuburat Oyeranti Adefemi
    2022 IEEE NIGERIA 4TH INTERNATIONAL CONFERENCE ON DISRUPTIVE TECHNOLOGIES FOR SUSTAINABLE DEVELOPMENT (IEEE NIGERCON), 2022, : 141 - 145
  • [7] Intrusion Detection System Test Framework for SCADA Systems
    Waagsnes, Henrik
    Ulltveit-Moe, Nils
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 275 - 285
  • [8] Privacy Preservation Intrusion Detection Technique for SCADA Systems
    Keshk, Marwa
    Moustafa, Nour
    Sitnikova, Elena
    Creech, Gideon
    2017 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS), 2017,
  • [9] On Using Physical Based Intrusion Detection in SCADA Systems
    Al-Asiri, Majed
    El-Alfy, El-Sayed M.
    11TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 3RD INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS, 2020, 170 : 34 - 42
  • [10] LSTM for SCADA Intrusion Detection
    Gao, Jun
    Gan, Luyun
    Buschendorf, Fabiola
    Zhang, Liao
    Liu, Hua
    Li, Peixue
    Dong, Xiaodai
    Lu, Tao
    2019 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2019,