Feature Engineering in Machine Learning-Based Intrusion Detection Systems for OT Networks

被引:0
|
作者
Howe, Alex [1 ]
Papa, Mauricio [1 ]
机构
[1] Univ Tulsa, Tandy Sch Comp Sci, Sch Elect & Comp Engn, Tulsa, OK 74104 USA
关键词
D O I
10.1109/SMARTCOMP58114.2023.00086
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper evaluates the importance of feature exploration and engineering when applying machine learning for intrusion detection in OT (Operational Technology) networks. Data used consisted of raw network traffic captures from a simulated OT environment communicating over the Modbus/TCP protocol. Feature engineering efforts identified thirty eight attributes of interest at the different layers of the network stack. The Random Forest algorithm was used to analyze the importance of each feature for the detection of anomalous network behavior. Both supervised and unsupervised learning methods were evaluated including Random Forest, Support Vector Machines, K-Nearest Neighbors, K-Means Clustering, and Isolation Forest. Results indicate that statistical based features as well as features derived from the protocol and application layers contained information best suited for detecting anomalous OT behavior. Additionally, variable importance-based feature selection helped reduce complexity and improved detection rate when compared with models trained on the original high dimensional data. Random Forest and Support Vector Machines had the best detection performance but required a large amount of labeled data for training and validation. Notably, Isolation Forest shows potential for anomaly detection in OT networks as it requires no labeled data and produced promising results.
引用
收藏
页码:361 / 366
页数:6
相关论文
共 50 条
  • [1] Feature extraction for machine learning-based intrusion detection in IoT networks
    Mohanad Sarhan
    Siamak Layeghy
    Nour Moustafa
    Marcus Gallagher
    Marius Portmann
    [J]. Digital Communications and Networks, 2024, 10 (01) : 205 - 216
  • [2] Feature extraction for machine learning-based intrusion detection in IoT networks
    Sarhan, Mohanad
    Layeghy, Siamak
    Moustafa, Nour
    Gallagher, Marcus
    Portmann, Marius
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (01) : 205 - 216
  • [3] Machine learning-based intrusion detection: feature selection versus feature extraction
    Ngo, Vu-Duc
    Vuong, Tuan-Cuong
    Van Luong, Thien
    Tran, Hung
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (03): : 2365 - 2379
  • [4] Machine learning-based intrusion detection for SCADA systems in healthcare
    Öztürk, Tolgahan
    Turgut, Zeynep
    Akgün, Gökçe
    Köse, Cemal
    [J]. Network Modeling Analysis in Health Informatics and Bioinformatics, 2022, 11 (01)
  • [5] Machine learning-based intrusion detection for SCADA systems in healthcare
    Ozturk, Tolgahan
    Turgut, Zeynep
    Akgun, Gokce
    Kose, Cemal
    [J]. NETWORK MODELING AND ANALYSIS IN HEALTH INFORMATICS AND BIOINFORMATICS, 2022, 11 (01):
  • [6] Machine learning-based intrusion detection for SCADA systems in healthcare
    Tolgahan Öztürk
    Zeynep Turgut
    Gökçe Akgün
    Cemal Köse
    [J]. Network Modeling Analysis in Health Informatics and Bioinformatics, 2022, 11
  • [7] The Study of Feature Engineering in Machine Learning and Deep Learning for Network Intrusion Detection Systems
    Ning, Steven
    Khanh Nguyen
    Bagchi, Sohini
    Park, Younghee
    [J]. 2024 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2024, 2024,
  • [8] Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models
    Almotairi, Ayoob
    Atawneh, Samer
    Khashan, Osama A.
    Khafajah, Nour M.
    [J]. SYSTEMS SCIENCE & CONTROL ENGINEERING, 2024, 12 (01)
  • [9] Machine learning-based intrusion detection technology for wireless sensor networks
    Luo F.
    Wu F.
    Chen Q.
    He J.
    Kou L.
    [J]. Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2020, 41 (03): : 433 - 440
  • [10] Machine learning-based intrusion detection algorithms
    Tang, Hua
    Cao, Zhuolin
    [J]. Journal of Computational Information Systems, 2009, 5 (06): : 1825 - 1831