Mining of intrusion attack in SCADA network using clustering and genetically seeded flora-based optimal classification algorithm

被引:20
|
作者
Shitharth, Shitharth [1 ]
Shaik, Masood [2 ]
Ameerjohn, Sirajudeen [3 ]
Kannan, Sangeetha [4 ]
机构
[1] JNT Univ, Vardhaman Coll Engn, Dept CSE, Hyderabad, India
[2] JNT Univ, Auroras Sci Technol & Res Acad, Dept CSE, Hyderabad, India
[3] JNT Univ, Auroras Sci Technol & Res Acad, Dept ECE, Hyderabad, India
[4] Sri Satya Sai Univ Technol & Med Sci, Dept CSE, Pachama, Madhya Pradesh, India
关键词
firewalls; botany; Boltzmann machines; data mining; pattern clustering; learning (artificial intelligence); genetic algorithms; SCADA systems; pattern classification; intrusion attack; SCADA network; genetically seeded flora-based optimal classification algorithm; remote communication; critically integrated arrangement; attack prediction; attack types; optimal selection; sensor data; cluster forms; attack identification; mean-shift clustering algorithm; genetically seeded flora optimisation algorithm; flora seeds; optimally selected clustered data; Boltzmann machine learning algorithm; SCADA dataset; supervisory control and data acquisition system; CONTROL-SYSTEM; OPTIMIZATION; SECURITY; IMPLEMENTATION;
D O I
10.1049/iet-ifs.2019.0011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The applications such as the remote communication and the control system are in critically integrated arrangement. The controlling of these network is specified by supervisory control and data acquisition (SCADA) systems. This study discusses about the attack prediction and classification process by using an enhanced model of machine learning technology. The attack types are classified by the optimal selection of features extracted from the sensor data. In this, the features are labelled and cluster between the matrixes are extracted. These cluster forms the initial processing of attack identification which prevents the mismatched result. This clustering of data is performed by mean-shift clustering algorithm. From that clustered data, the features that are irrelevant for classification process is identified and suppressed by using the genetically seeded flora optimisation algorithm. In this optimisation process, the flora seeds are selected genetically to select best features. Then, from that optimally selected clustered data, the relevancy vector is predicted and the types are classified. The classification process is performed by the Boltzmann machine learning algorithm. The classified results of the proposed method for testing SCADA dataset are analysed and the performance metrics are evaluated and compared with the state-of-the-art methods.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 11 条
  • [1] Unknown Attack Traffic Classification in SCADA Network Using Heuristic Clustering Technique
    Sheng, Chuan
    Yao, Yu
    Li, Wenxuan
    Yang, Wei
    Liu, Ying
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (03): : 2625 - 2638
  • [2] The intrusion data mining method for distributed network based on fuzzy kernel clustering algorithm
    Li, Linlin
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2022, 15 (01) : 32 - 45
  • [3] MULTI AGENT SYSTEM FOR NETWORK ATTACK CLASSIFICATION USING FLOW-BASED INTRUSION DETECTION
    Hancock, David L.
    Lamont, Gary B.
    2011 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2011, : 1535 - 1542
  • [4] Attack Classification of Imbalanced Intrusion Data for IoT Network Using Ensemble-Learning-Based Deep Neural Network
    Thakkar, Ankit
    Lohiya, Ritika
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (13) : 11888 - 11895
  • [5] A Novel Clustering Algorithm for Mining Speech Data using Baysian Network-based Mutliple Model
    Zhao, Feng
    Wu, Delong
    Yuan, Pingpeng
    Jin, Hai
    PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 617 - 620
  • [6] Anomaly Classification Using Genetic Algorithm-Based Random Forest Model for Network Attack Detection
    Assiri, Adel
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (01): : 767 - 778
  • [7] Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network
    Doddi Srilatha
    Gopal K. Shyam
    Cluster Computing, 2021, 24 : 2657 - 2672
  • [8] Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network
    Srilatha, Doddi
    Shyam, Gopal K.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 2657 - 2672
  • [9] Event classification using improved salp swarm algorithm based probabilistic neural network in fiber-optic perimeter intrusion detection system
    Chen, Peichao
    You, Citian
    Ding, Panfeng
    OPTICAL FIBER TECHNOLOGY, 2020, 56
  • [10] Optimal prosodic feature extraction and classification in parametric excitation source information for Indian language identification using neural network based Q-learning algorithm
    Himanish Shekhar Das
    Pinki Roy
    International Journal of Speech Technology, 2019, 22 : 67 - 77