Unknown Attack Traffic Classification in SCADA Network Using Heuristic Clustering Technique

被引:10
|
作者
Sheng, Chuan [1 ,2 ,3 ]
Yao, Yu [4 ,5 ]
Li, Wenxuan [4 ,5 ]
Yang, Wei [6 ]
Liu, Ying [4 ,5 ]
机构
[1] Chinese Acad Sci, Key Lab Networked Control Syst, Shenyang 110016, Peoples R China
[2] Chinese Acad Sci, Shenyang Inst Automat, Shenyang 110016, Peoples R China
[3] Chinese Acad Sci, Inst Robot & Intelligent Mfg, Shenyang 110169, Peoples R China
[4] Northeastern Univ, Sch Comp Sci & Engn, Minist Educ, Shenyang 110169, Peoples R China
[5] Northeastern Univ, Minist Educ, Engn Res Ctr Secur Technol Complex Network Syst, Shenyang 110169, Peoples R China
[6] Northeastern Univ, Software Coll, Shenyang 110169, Peoples R China
基金
国家重点研发计划;
关键词
Attack traffic classification; heuristic clustering; SCADA network; traffic representation;
D O I
10.1109/TNSM.2023.3238402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack Traffic Classification (ATC) technique is an essential tool for Industrial Control System (ICS) network security, which can be widely used in active defense, situational awareness, attack source traceback and so on. At present, the state-of-the-art ATC methods are usually based on traffic statistical features and machine learning techniques, including supervised classification methods and unsupervised clustering methods. However, it is difficult for these methods to overcome the problems of lack of attack samples and high real-time requirement in ATC in Supervisory Control and Data Acquisition (SCADA) networks. In order to address the above problems, we propose a self-growing ATC model based on a new density-based heuristic clustering method, which can continuously and automatically detect and distinguish different kinds of unknown attack traffic generated by various attack tools against SCADA networks in real time. An effective representation method of SCADA network traffic is proposed to further improve the performance of ATC. In addition, a large number of experiments are conducted on a compound dataset consisting of the SCADA network dataset, the attack tool dataset and the ICS honeypot dataset, to evaluate the proposed method. The experimental results show that the proposed method outperforms existing state-of-the-art ATC methods in the crucial situation of only normal SCADA network traffic.
引用
收藏
页码:2625 / 2638
页数:14
相关论文
共 50 条
  • [21] Internet Traffic Classification Using Constrained Clustering
    Wang, Yu
    Xiang, Yang
    Zhang, Jun
    Zhou, Wanlei
    Wei, Guiyi
    Yang, Laurence T.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (11) : 2932 - 2943
  • [22] Network traffic classification based on semi-supervised clustering
    Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    不详
    J. China Univ. Post Telecom., SUPPL. 2 (84-88):
  • [23] Network traffic analysis using clustering ants
    Ekola, T
    Laurikkala, M
    Lehto, T
    Koivisto, H
    Soft Computing with Industrial Applications, Vol 17, 2004, 17 : 275 - 280
  • [24] An adaptive classification and updating method for unknown network traffic in open environments
    Le, Siqi
    Lai, Yingxu
    Wang, Yipeng
    He, Huijie
    COMPUTER NETWORKS, 2024, 238
  • [25] A Novel LWCSO-PKM-Based Feature Optimization and Classification of Attack Types in SCADA Network
    Sadhasivan, Dhanalakshmi Krishnan
    Balasubramanian, Kannapiran
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (08) : 3435 - 3449
  • [26] Network Attack Classification with a Shallow Neural Network for Internet and Internet of Things (IoT) Traffic
    Ehmer, Jorg
    Savaria, Yvon
    Granado, Bertrand
    David, Jean-Pierre
    Denoulet, Julien
    ELECTRONICS, 2024, 13 (16)
  • [27] A Novel LWCSO-PKM-Based Feature Optimization and Classification of Attack Types in SCADA Network
    Dhanalakshmi Krishnan Sadhasivan
    Kannapiran Balasubramanian
    Arabian Journal for Science and Engineering, 2017, 42 : 3435 - 3449
  • [28] DDoS attack traffic classification in SDN using deep learning
    Ahuja N.
    Mukhopadhyay D.
    Singal G.
    Personal and Ubiquitous Computing, 2024, 28 (02) : 417 - 429
  • [29] Network Traffic Classification for Anomaly Detection Fuzzy Clustering Based Approach
    Asmuss, Julija
    Lauks, Gunars
    2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2015, : 313 - 318
  • [30] Adaptive Clustering-based Malicious Traffic Classification at the Network Edge
    Diallo, Alec F.
    Patras, Paul
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021), 2021,