Affiliation:
1. School of Computer Science, Sichuan University, Chengdu 610065, China
2. Institute for Industrial Internet Research, Sichuan University, Chengdu 610065, China
Abstract
With the gradual integration of internet technology and the industrial control field, industrial control systems (ICSs) have begun to access public networks on a large scale. Attackers use these public network interfaces to launch frequent invasions of industrial control systems, thus resulting in equipment failure and downtime, production data leakage, and other serious harm. To ensure security, ICSs urgently need a mature intrusion detection mechanism. Most of the existing research on intrusion detection in ICSs focuses on improving the accuracy of intrusion detection, thereby ignoring the problem of limited equipment resources in industrial control environments, which makes it difficult to apply excellent intrusion detection algorithms in practice. In this study, we first use the spectral residual (SR) algorithm to process the data; we then propose the improved lightweight variational autoencoder (LVA) with autoregression to reconstruct the data, and we finally perform anomaly determination based on the permutation entropy (PE) algorithm. We construct a lightweight unsupervised intrusion detection model named LVA-SP. The model as a whole adopts a lightweight design with a simpler network structure and fewer parameters, which achieves a balance between the detection accuracy and the system resource overhead. Experimental results on the ICSs dataset show that our proposed LVA-SP model achieved an F1-score of 84.81% and has advantages in terms of time and memory overhead.
Funder
National Natural Science Foundation of China
Sichuan Science and Technology Program
Luzhou Science and Technology Innovation R&D Program
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference32 articles.
1. FPGA-based network intrusion detection for IEC 61850-based industrial network;Kim;ICT Express,2018
2. Vollmer, T., Alves-Foss, J., and Manic, M. (2011, January 11–15). Autonomous rule creation for intrusion detection. Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), Paris, France.
3. Denning, D., and Neumann, P.G. (1985). Requirements and Model for IDES-a Real-Time Intrusion-Detection Expert System, SRI International Menlo Park.
4. Multivariate statistical analysis of audit trails for host-based intrusion detection;Ye;IEEE Trans. Comput.,2002
5. Estevez-Tapiador, J.M., Garcia-Teodoro, P., and Diaz-Verdejo, J.E. (2003, January 24). Stochastic protocol modeling for anomaly based network intrusion detection. Proceedings of the First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings, Darmstadt, Germany.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献