3.8 Article

A three-tiered intrusion detection system for industrial control systems

期刊

JOURNAL OF CYBERSECURITY
卷 7, 期 1, 页码 -

出版社

OXFORD UNIV PRESS
DOI: 10.1093/cybsec/tyab006

关键词

supervised machine learning; industrial control systems; attack detection; intrusion detection system; networks

资金

  1. Airbus Endeavr, grant SCADA Cybersecurity Lifecycle 2
  2. Engineering and Physical Sciences Research Council (EPSRC), grant New Industrial Systems: Chatty Factories [EP/R021031/1]
  3. EPSRC [EP/R021031/1] Funding Source: UKRI

向作者/读者索取更多资源

This article introduces a three-tiered intrusion detection system for industrial control systems networks, which can effectively distinguish malicious activities and classify attack types, improving the response speed to network security incidents.
This article presents three-tiered intrusion detection systems, which uses a supervised approach to detect cyber-attacks in industrial control systems networks. The proposed approach does not only aim to identify malicious packets on the network but also attempts to identify the general and finer grain attack type occurring on the network. This is key in the industrial control systems environment as the ability to identify exact attack types will lead to an increased response rate to the incident and the defence of the infrastructure. More specifically, the proposed system consists of three stages that aim to classify: (i) whether packets are malicious; (ii) the general attack type of malicious packets (e.g. Denial of Service); and (iii) finer-grained cyber-attacks (e.g. bad cyclic redundancy check, attack). The effectiveness of the proposed intrusion detection systems is evaluated on network data collected from a real industrial gas pipeline system. In addition, an insight is provided as to which features are most relevant in detecting such malicious behaviour. The performance of the system results in an F-measure of: (i) 87.4%, (ii) 74.5% and (iii) 41.2%, for each of the layers, respectively. This demonstrates that the proposed architecture can successfully distinguish whether network activity is malicious and detect which general attack was deployed.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据