Author:
Huang Meng,Li Wenshan,He Junjiang,Lan Xiaolong,Li Tao,Zhang Nian
Abstract
AbstractAnomaly detection is a critical line of defense to ensure the network security of industrial cyber-physical systems. However, a significant issue in the anomaly detection is the insufficient labels of anomaly classes. With emergence of the new and unknown network attacks, accurately labeling these attacks can be a costly task. The issue of inadequate labeling may negatively impact the detection performance of many existing anomaly detection methods. To meet this gap, this paper proposes a semi-supervised collaborative learning paradigm called IDG-SemiAD, based on an immune detector generation algorithm. First, we design an immune detector generation algorithm based on a chaos map to generate abnormal samples from self-samples. Then, these abnormal samples are combined with self-samples and given specific labels to form a new training set. Finally, the LightGBM classifier is used for training and detection. Experiments on the widely used public dataset BATADAL show that the proposed IDG-SemiAD outperforms the classical v-detector method in terms of recall and f-score, with improvements of 8.2% and 8%, respectively, and outperforms deep learning-based anomaly detection methods, with a maximum improvements of up to 89.7% and 59.5% respectively.
Funder
Key Technologies Research and Development Program
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Reference52 articles.
1. Kim, K.D., Kumar, P.R.: Cyber-physical systems: a perspective at the centennial. Proc. IEEE 100, 1287–1308 (2012)
2. Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-physical systems security: a survey. IEEE Internet Things J. 4, 1802–31 (2017)
3. Hang, K., Shi, Y., Karnouskos, S., Sauter, T., Fang, H., Colombo, A.W.: Advancements in industrial cyber-physical systems: an overview and perspectives. IEEE Trans. Ind. Inform. 19, 716–722 (2022)
4. Kaspersky, I.C.S.: Threat landscape for industrial automation systems. Statistics for H (2021)
5. Farwell, J.P., Rohozinski, R.: Stuxnet and the future of cyber war. Survival 53, 23–40 (2011)