Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods

Author:

Kwon Hee-YongORCID,Kim TaesicORCID,Lee Mun-KyuORCID

Abstract

Recently, devices in real-time systems, such as residential facilities, vehicles, factories, and social infrastructure, have been increasingly connected to communication networks. Although these devices provide administrative convenience and enable the development of more sophisticated control systems, critical cybersecurity concerns and challenges remain. In this paper, we propose a hybrid anomaly detection method that combines statistical filtering and a composite autoencoder to effectively detect anomalous behaviors possibly caused by malicious activity in order to mitigate the risk of cyberattacks. We used the SWaT dataset, which was collected from a real water treatment system, to conduct a case study of cyberattacks on industrial control systems to validate the performance of the proposed approach. We then evaluated the performance of the proposed hybrid detection method on a dataset with two time window settings for the composite autoencoder. According to the experimental results, the proposed method improved the precision, recall, and F1-score by up to 0.008, 0.067, and 0.039, respectively, compared to an autoencoder-only approach. Moreover, we evaluated the computational cost of the proposed method in terms of execution time. The execution time of the proposed method was reduced by up to 8.03% compared to that of an autoencoder-only approach. Through the experimental results, we show that the proposed method detected more anomalies than an autoencoder-only detection approach and it also operated significantly faster.

Funder

Institute for Information and Communications Technology Promotion

Inha University

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering

Reference48 articles.

1. Stuxnet and the Future of Cyber War

2. The untold story of NotPetya, the most devastating cyberattack in historyhttps://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/

3. Unpacking an Unprecedented Cyberattack: What Is the SolarWinds Breach and How Did It Happen?https://jost.syr.edu/unpacking-an-unprecedented-cyberattack-what-is-the-solarwinds-breach-and-how-did-it-happen/#_ftn3

4. EKANS Ransomware and ICS Operationshttps://www.dragos.com/blog/industry-news/ekans-ransomware-and-ics-operations/#

5. Ryuk Ransomware Explained: A Targeted, Devastatingly Effective Attackhttps://www.csoonline.com/article/3541810/ryuk-ransomware-explained-a-targeted-devastatingly-effective-attack.html

Cited by 25 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A comprehensive survey on deep learning‐based intrusion detection systems in Internet of Things (IoT);Expert Systems;2024-09-14

2. Exploiting user-centred design to secure industrial control systems;Frontiers in the Internet of Things;2024-09-13

3. Malware Detection using Anomaly Detection Algorithms;2024 Fifteenth International Conference on Ubiquitous and Future Networks (ICUFN);2024-07-02

4. A real-time network based anomaly detection in industrial control systems;International Journal of Critical Infrastructure Protection;2024-07

5. Explainable Intrusion Detection in Industrial Control Systems;2024 IEEE 7th International Conference on Industrial Cyber-Physical Systems (ICPS);2024-05-12

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3