SCADA Networks Anomaly-based Intrusion Detection System

被引:0
|
作者
Almehmadi, Abdulaziz [1 ]
机构
[1] Univ Tabuk, Tabuk, Saudi Arabia
来源
11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018) | 2018年
关键词
Anomaly-based Intrusion Detection System; SCADA;
D O I
10.1145/3264437.3264471
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intentional attacks(1) that cause country wide blackouts, gas and water systems malfunction are actions that can be carried out by a nation to impact on another nation in a mean of war. Supervisory control and data acquisition (SCADA) networks that allow for communication for the utilities companies were designed with no security in mind causing the systems that a nation relies on to fall vulnerable to exploitation. Since SCADA networks are static in nature with pre-defined signatures of network traffic, we propose to design an anomaly-based intrusion detection system to detect abnormality in SCADA network traffic and protocols. We gather normal SCADA network traffic via tapping on the network for 30 days and then attack the network using Denial of Service (DoS) attack, message spoofing attack and man-in-the middle attack. We then train a classifier with two classes, normal and abnormal and report the classifier accuracy in detecting abnormal SCADA network traffic.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] LSTM for Anomaly-Based Network Intrusion Detection
    Althubiti, Sara A.
    Jones, Eric Marcell, Jr.
    Roy, Kaushik
    2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 293 - 295
  • [22] Anomaly-Based Intrusion Detection System Using Support Vector Machine
    Krishnaveni, S.
    Vigneshwar, Palani
    Kishore, S.
    Jothi, B.
    Sivamohan, S.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, 2020, 1056 : 723 - 731
  • [23] Review on Feature Selection Algorithms for Anomaly-Based Intrusion Detection System
    Alamiedy, Taief Alaa
    Anbar, Mohammed
    Al-Ani, Ahmed K.
    Al-Tamimi, Bassam Naji
    Faleh, Nameer
    RECENT TRENDS IN DATA SCIENCE AND SOFT COMPUTING, IRICT 2018, 2019, 843 : 605 - 619
  • [24] Hybrid Intrusion Detection System using an Unsupervised method for Anomaly-based Detection
    Bhadauria, Saumya
    Mohanty, Tamanna
    2021 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (IEEE ANTS), 2021,
  • [25] DroidLight: Lightweight Anomaly-based Intrusion Detection System for Smartphone Devices
    Barbhuiya, Sakil
    Kilpatrick, Peter
    Nikolopoulos, Dimitrios S.
    PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING (ICDCN 2020), 2020,
  • [26] Anomaly-Based Intrusion Detection System for Cyber-Physical System Security
    Colelli, Riccardo
    Magri, Filippo
    Panzieri, Stefano
    Pascucci, Federica
    2021 29TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2021, : 428 - 434
  • [27] RCLNet: an effective anomaly-based intrusion detection for securing the IoMT system
    Shaikh, Jamshed Ali
    Wang, Chengliang
    Muhammad, Wajeeh Us Sima
    Arshad, Muhammad
    Owais, Muhammad
    Alnashwan, Rana Othman
    Chelloug, Samia Allaoua
    Muthanna, Mohammed Saleh Ali
    FRONTIERS IN DIGITAL HEALTH, 2024, 6
  • [28] HA-IDS: A Heterogeneous Anomaly-based Intrusion Detection System
    Chau Tran
    Tran Nguyen Vo
    Tran Ngoc Thinh
    2017 4TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2017, : 156 - 161
  • [29] A clustering method for improving performance of anomaly-based intrusion detection system
    Song, Jungsuk
    Ohira, Kenji
    Takakura, Hiroki
    Okabe, Yasuo
    Kwon, Yongjin
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1282 - 1291
  • [30] An anomaly-based Network Intrusion Detection System using Deep learning
    Nguyen Thanh Van
    Tran Ngoc Thinh
    Le Thanh Sach
    2017 INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND ENGINEERING (ICSSE), 2017, : 210 - 214