SCADA Networks Anomaly-based Intrusion Detection System

被引:0
|
作者
Almehmadi, Abdulaziz [1 ]
机构
[1] Univ Tabuk, Tabuk, Saudi Arabia
关键词
Anomaly-based Intrusion Detection System; SCADA;
D O I
10.1145/3264437.3264471
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intentional attacks(1) that cause country wide blackouts, gas and water systems malfunction are actions that can be carried out by a nation to impact on another nation in a mean of war. Supervisory control and data acquisition (SCADA) networks that allow for communication for the utilities companies were designed with no security in mind causing the systems that a nation relies on to fall vulnerable to exploitation. Since SCADA networks are static in nature with pre-defined signatures of network traffic, we propose to design an anomaly-based intrusion detection system to detect abnormality in SCADA network traffic and protocols. We gather normal SCADA network traffic via tapping on the network for 30 days and then attack the network using Denial of Service (DoS) attack, message spoofing attack and man-in-the middle attack. We then train a classifier with two classes, normal and abnormal and report the classifier accuracy in detecting abnormal SCADA network traffic.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] An Anomaly-based Intrusion Detection System Using Butterfly Optimization Algorithm
    Mahboob, Amir Soltany
    Moghaddam, Mohammad Reza Ostadi
    2020 6TH IRANIAN CONFERENCE ON SIGNAL PROCESSING AND INTELLIGENT SYSTEMS (ICSPIS), 2020,
  • [32] Undermining an anomaly-based intrusion detection system using common exploits
    Tan, KMC
    Killourhy, KS
    Maxion, RA
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2002, 2516 : 54 - 73
  • [33] Towards an efficient anomaly-based intrusion detection for software-defined networks
    Latah, Majd
    Toker, Levent
    IET NETWORKS, 2018, 7 (06) : 453 - 459
  • [34] Anomaly-Based Intrusion Detection Model Using Deep Learning for IoT Networks
    Alsoufi, Muaadh A.
    Siraj, Maheyzah Md
    Ghaleb, Fuad A.
    Al-Razgan, Muna
    Al-Asaly, Mahfoudh Saeed
    Alfakih, Taha
    Saeed, Faisal
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 141 (01): : 823 - 845
  • [35] Game Theoretical Method for Anomaly-Based Intrusion Detection
    Wang, Zhiyong
    Xu, Shengwei
    Xu, Guoai
    Yin, Yongfeng
    Zhang, Miao
    Sun, Dawei
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [36] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques
    Kumar, Neeraj
    Kumar, Upendra
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269
  • [37] Lightweight Anomaly-based Intrusion Detection System for Multi-feature Traffic in Wireless Sensor Networks
    Derhab, Abdelouahid
    Bouras, Abdelghani
    AD HOC & SENSOR WIRELESS NETWORKS, 2016, 30 (3-4) : 201 - 217
  • [38] Anomaly-Based Network Intrusion Detection Using SVM
    Zhang, Yuan
    Yang, Qinghai
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos
    Ghafir, Ibrahim
    AsSadhan, Basil
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [39] Feature Selection for Effective Anomaly-Based Intrusion Detection
    Ghali, Noreen I.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 285 - 289
  • [40] An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities
    Karami, Amin
    EXPERT SYSTEMS WITH APPLICATIONS, 2018, 108 : 36 - 60