SSO-IF: An Outlier Detection Approach for Intrusion Detection in SCADA Systems

被引:5
|
作者
Chaithanya, P. S. [1 ]
Priyanga, S. [1 ]
Pravinraj, S. [1 ]
Sriram, V. S. Shankar [1 ]
机构
[1] SASTRA Deemed Univ, Ctr Informat Super Highway CISH, Sch Comp, Thanjavur 613401, Tamil Nadu, India
来源
INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019 | 2020年 / 89卷
关键词
SCADA; Intrusion detection system; Isolation forest; Salp swarm optimization; ALGORITHM;
D O I
10.1007/978-981-15-0146-3_89
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Supervisory Control and Data Acquisition (SCADA) systems play a prominent role in monitoring and controlling the Critical Infrastructures (CIs) such as water distribution, nuclear plants, and chemical industries. On the other hand, SCADA systems are highly exposed to new vulnerabilities as it highly relies on the internet. Machine learning approaches have been employed to detect the cyberattacks injected by the attackers in CIs. However, those approaches failed to protect the CIs against the ever-advancing nature of cyberattacks. This work presents Salp Swarm Optimization-based Isolation Forest (SSO-IF) to build an efficient SCADA intrusion detection system, and the experiments were carried out using power system dataset from Mississippi State University. The performance of SSO-IF was validated over the state-of-the-art intrusion detection techniques in terms of classification accuracy and detection rate.
引用
收藏
页码:921 / 929
页数:9
相关论文
共 50 条
  • [21] NETWORK INTRUSION DETECTION MECHANISMS USING OUTLIER DETECTION
    Nagamani, Ch.
    Chittineni, Suneetha
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1468 - 1473
  • [22] An Intrusion Detection Method Based on Outlier Ensemble Detection
    Huang, Bin
    Li, Wen-fang
    Chen, De-li
    Shi, Liang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 600 - +
  • [23] An Improved Rough Set Theory based Feature Selection Approach for Intrusion Detection in SCADA Systems
    Priyanga, S.
    Raman, M. R. Gauthama
    Jagtap, Sujeet S.
    Aswin, N.
    Kirthivasan, Kannan
    Sriram, V. S. Shankar
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 36 (05) : 3993 - 4003
  • [24] Intrusion Detection in SCADA System: A Survey
    Zeng, Pu
    Zhou, Peng
    INTELLIGENT COMPUTING AND INTERNET OF THINGS, PT II, 2018, 924 : 342 - 351
  • [25] Adversarial Attack Detection Approach for Intrusion Detection Systems
    Degirmenci, Elif
    Ozcelik, Ilker
    Yazici, Ahmet
    IEEE ACCESS, 2024, 12 : 195996 - 196009
  • [26] INTRUSION DETECTION IN SCADA SYSTEMS USING ONE-CLASS CLASSIFICATION
    Nader, Patric
    Honeine, Paul
    Beauseroy, Pierre
    2013 PROCEEDINGS OF THE 21ST EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2013,
  • [27] Machine learning-based intrusion detection for SCADA systems in healthcare
    Ozturk, Tolgahan
    Turgut, Zeynep
    Akgun, Gokce
    Kose, Cemal
    NETWORK MODELING AND ANALYSIS IN HEALTH INFORMATICS AND BIOINFORMATICS, 2022, 11 (01):
  • [28] Probability Risk Identification Based Intrusion Detection System for SCADA Systems
    Marsden, Thomas
    Moustafa, Nour
    Sitnikova, Elena
    Creech, Gideon
    MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 235 : 353 - 363
  • [29] Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems
    Kamaev, V. A.
    Finogeev, A. G.
    Finogeev, A. A.
    Parygin, D. S.
    INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2016, 2017, 803
  • [30] Machine learning-based intrusion detection for SCADA systems in healthcare
    Öztürk, Tolgahan
    Turgut, Zeynep
    Akgün, Gökçe
    Köse, Cemal
    Network Modeling Analysis in Health Informatics and Bioinformatics, 2022, 11 (01)