Author:
Anwar Mahwish,Lundberg Lars,Borg Anton
Abstract
AbstractNetwork anomaly detection for critical infrastructure supervisory control and data acquisition (SCADA) systems is the first line of defense against cyber-attacks. Often hybrid methods, such as machine learning with signature-based intrusion detection methods, are employed to improve the detection results. Here an attempt is made to enhance the support vector-based outlier detection method by leveraging behavioural attribute extension of the network nodes. The network nodes are modeled as graph vertices to construct related attributes that enhance network characterisation and potentially improve unsupervised anomaly detection ability for SCADA network. IEC 104 SCADA protocol communication data with good domain fidelity is utilised for empirical testing. The results demonstrate that the proposed approach achieves significant improvements over the baseline approach (average $$F_{1}$$
F
1
score increased from 0.6 to 0.9, and Matthews correlation coefficient (MCC) from 0.3 to 0.8). The achieved outcome also surpasses the unsupervised scores of related literature. For critical networks, the identification of attacks is indispensable. The result shows an insignificant missed-alert rate ($$0.3\%$$
0.3
%
on average), the lowest among related works. The gathered results show that the proposed approach can expose rouge SCADA nodes reasonably and assist in further pruning the identified unusual instances.
Funder
Blekinge Institute of Technology
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Energy Engineering and Power Technology,Information Systems
Reference41 articles.
1. Akoglu L, McGlohon M, Faloutsos C (2010) Oddball: Spotting anomalies in weighted graphs. In: Zaki MJ, Yu JX, Ravindran B, Pudi V (eds) Advances in knowledge discovery and data mining. Pacific-Asia conference on knowledge discovery and data mining (PAKDD). Lecture notes in computer science, Vol 6119. Springer, Berlin, Heidelberg, pp. 410–421
2. Anwar M, Borg A, Lundberg L (2021) A comparison of unsupervised learning algorithms for intrusion detection in IEC 104 SCADA protocol. In: 20th International conference on machine learning and cybernetics (ICMLC), IEEE, pp. 1–8. https://doi.org/10.1109/ICMLC54886.2021.9737267
3. Assante MJ, Lee RM (2015) The industrial control system cyber kill chain. Technical report, SANS Institute InfoSec Reading Room
4. Chicco D, Jurman G (2020) The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation. BMC Genomics 21(1):6. https://doi.org/10.1186/s12864-019-6413-7
5. CISA (2016) ICS Alert (IR-ALERT-H-16-056-01). Cyber-attack against Ukrainian critical infrastructure; Cybersecurity and Infrastructure Security Agency. Cybersecurity and Infrastructure Security Agency (CISA). https://www.cisa.gov/uscert/ics/alerts/IR-ALERT-H-16-056-01. Accessed 9 May 2022
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Anomaly Detection in SCADA Systems: A State Transition Modeling;IEEE Transactions on Network and Service Management;2024-06
2. Mitigating Resource Depletion and Message Sequencing Attacks in SCADA Systems;Lecture Notes on Data Engineering and Communications Technologies;2024
3. Anomaly Detection in Industrial Control System using FSODCONV Method;Proceedings of the 2023 6th International Conference on Information Science and Systems;2023-08-11