A Diffusion Model Based on Network Intrusion Detection Method for Industrial Cyber-Physical Systems
Author:
Tang Bin,Lu Yan,Li Qi,Bai Yueying,Yu Jie,Yu Xu
Abstract
Industrial Cyber-Physical Systems (ICPS) connect intelligent manufacturing equipment equipped with sensors, wireless and RFID communication technologies through data interaction, which makes the interior of the factory, even between factories, become a whole. However, intelligent factories will suffer information leakage and equipment damage when being attacked by ICPS intrusion. Therefore, the network security of ICPS cannot be ignored, and researchers have conducted in-depth research on network intrusion detection for ICPS. Though machine learning and deep learning methods are often used for network intrusion detection, the problem of data imbalance can cause the model to pay attention to the misclassification cost of the prevalent class, but ignore that of the rare class, which seriously affects the classification performance of network intrusion detection models. Considering the powerful generative power of the diffusion model, we propose an ICPS Intrusion Detection system based on the Diffusion model (IDD). Firstly, data corresponding to the rare class is generated by the diffusion model, which makes the training dataset of different classes balanced. Then, the improved BiLSTM classification network is trained on the balanced training set. Extensive experiments are conducted to show that the IDD method outperforms the existing baseline method on several available datasets.
Funder
National Natural Science Foundation of China
Natural Science Foundation of Shandong Province
Fundamental Research Funds for the Central Universities, JLU
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference42 articles.
1. Anomaly-based network intrusion detection: Techniques, systems and challenges;Vazquez;Comput. Secur.,2009
2. Survey on Anomaly Detection using Data Mining Techniques;Agrawal;Procedia Comput. Sci.,2015
3. A Survey of Intrusion Detection Systems in Wireless Sensor Networks;Butun;IEEE Commun. Surv. Tutor.,2014
4. Hodo, E., Bellekens, X., Hamilton, A., Tachtatzis, C., and Atkinson, R. (2017). Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey. arXiv.
5. Aminanto, M.E., and Kim, K. (2017, January 24–26). Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning. Proceedings of the 18th International Conference on Information Security Applications, Jeju Island, Republic of Korea.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献