3.8 Article

A three-tiered intrusion detection system for industrial control systems

Journal

JOURNAL OF CYBERSECURITY
Volume 7, Issue 1, Pages -

Publisher

OXFORD UNIV PRESS
DOI: 10.1093/cybsec/tyab006

Keywords

supervised machine learning; industrial control systems; attack detection; intrusion detection system; networks

Funding

  1. Airbus Endeavr, grant SCADA Cybersecurity Lifecycle 2
  2. Engineering and Physical Sciences Research Council (EPSRC), grant New Industrial Systems: Chatty Factories [EP/R021031/1]
  3. EPSRC [EP/R021031/1] Funding Source: UKRI

Ask authors/readers for more resources

This article introduces a three-tiered intrusion detection system for industrial control systems networks, which can effectively distinguish malicious activities and classify attack types, improving the response speed to network security incidents.
This article presents three-tiered intrusion detection systems, which uses a supervised approach to detect cyber-attacks in industrial control systems networks. The proposed approach does not only aim to identify malicious packets on the network but also attempts to identify the general and finer grain attack type occurring on the network. This is key in the industrial control systems environment as the ability to identify exact attack types will lead to an increased response rate to the incident and the defence of the infrastructure. More specifically, the proposed system consists of three stages that aim to classify: (i) whether packets are malicious; (ii) the general attack type of malicious packets (e.g. Denial of Service); and (iii) finer-grained cyber-attacks (e.g. bad cyclic redundancy check, attack). The effectiveness of the proposed intrusion detection systems is evaluated on network data collected from a real industrial gas pipeline system. In addition, an insight is provided as to which features are most relevant in detecting such malicious behaviour. The performance of the system results in an F-measure of: (i) 87.4%, (ii) 74.5% and (iii) 41.2%, for each of the layers, respectively. This demonstrates that the proposed architecture can successfully distinguish whether network activity is malicious and detect which general attack was deployed.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available