Improving anomaly detection in SCADA network communication with attribute extension

被引:0
|
作者
Anwar M. [1 ]
Lundberg L. [1 ]
Borg A. [1 ]
机构
[1] Department of Computer Science, Blekinge Institute of Technology, 371 79, Karlskrona
关键词
Attribute extension; IEC; 60870-5-104; Machine learning; Network intrusion detection; Supervisory control and data acquisition;
D O I
10.1186/s42162-022-00252-1
中图分类号
学科分类号
摘要
Network anomaly detection for critical infrastructure supervisory control and data acquisition (SCADA) systems is the first line of defense against cyber-attacks. Often hybrid methods, such as machine learning with signature-based intrusion detection methods, are employed to improve the detection results. Here an attempt is made to enhance the support vector-based outlier detection method by leveraging behavioural attribute extension of the network nodes. The network nodes are modeled as graph vertices to construct related attributes that enhance network characterisation and potentially improve unsupervised anomaly detection ability for SCADA network. IEC 104 SCADA protocol communication data with good domain fidelity is utilised for empirical testing. The results demonstrate that the proposed approach achieves significant improvements over the baseline approach (average F1 score increased from 0.6 to 0.9, and Matthews correlation coefficient (MCC) from 0.3 to 0.8). The achieved outcome also surpasses the unsupervised scores of related literature. For critical networks, the identification of attacks is indispensable. The result shows an insignificant missed-alert rate (0.3 % on average), the lowest among related works. The gathered results show that the proposed approach can expose rouge SCADA nodes reasonably and assist in further pruning the identified unusual instances. © 2022, The Author(s).
引用
收藏
相关论文
共 50 条
  • [1] Evaluation of Anomaly Detection Techniques for SCADA Communication Resilience
    Shirazi, Syed Noorulhassan
    Gouglidis, Antonios
    Syeda, Kanza Noor
    Simpson, Steven
    Mauthe, Andreas
    Stephanakis, Ioannis M.
    Hutchison, David
    2016 RESILIENCE WEEK (RWS), 2016, : 140 - 145
  • [2] Neural network based anomaly detection for SCADA systems
    Reuter, Lenhard
    Jung, Oliver
    Magin, Julian
    2020 23RD CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN 2020), 2020, : 194 - 201
  • [3] Network Anomaly Detection for m-connected SCADA Networks
    Kim, Si-Jung
    Kim, Bong-Han
    Yeo, Sang-Soo
    Cho, Do-Eun
    2013 EIGHTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2013), 2013, : 351 - 354
  • [4] Anomaly detection in a mobile communication network
    Pawling A.
    Chawla N.V.
    Madey G.
    Computational and Mathematical Organization Theory, 2007, 13 (4) : 407 - 422
  • [5] Safeguarding SCADA systems with anomaly detection
    Bigham, J
    Gamez, D
    Lu, N
    COMPUTER NETWORK SECURITY, 2003, 2776 : 171 - 182
  • [6] A Review of SCADA Anomaly Detection Systems
    Garitano, Inaki
    Uribeetxeberria, Roberto
    Zurutuza, Urko
    SOFT COMPUTING MODELS IN INDUSTRIAL AND ENVIRONMENTAL APPLICATIONS, 6TH INTERNATIONAL CONFERENCE SOCO 2011, 2011, 87 : 357 - 366
  • [7] Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network
    Kim, Kyoung-Ho
    Yun, Jeong-Han
    Chang, Yeop
    Kim, Woonyon
    INFORMATION SECURITY APPLICATIONS, WISA 2014, 2015, 8909 : 358 - 369
  • [8] Add-On Anomaly Threshold Technique for Improving Unsupervised Intrusion Detection on SCADA Data
    Almalawi, Abdulmohsen
    Fahad, Adil
    Tari, Zahir
    Khan, Asif Irshad
    Alzahrani, Nouf
    Bakhsh, Sheikh Tahir
    Alassafi, Madini O.
    Alshdadi, Abdulrahman
    Qaiyum, Sana
    ELECTRONICS, 2020, 9 (06) : 1 - 20
  • [9] Anomaly Detection on Attribute Network by Multi-Angle Contrastive Learning
    Li, Baozhen
    Kong, Qianwen
    Su, Yuwei
    Computer Engineering and Applications, 2024, 60 (19) : 167 - 177
  • [10] Accuracy improving guidelines for network anomaly detection systems
    Ashfaq, Ayesha Binte
    Ali, Muhammad Qasim
    Khayam, Syed Ali
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (01): : 63 - 81