首页> 外文期刊>Computers & Security >An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
【24h】

An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems

机译:基于无监督的基于异常的SCADA系统完整性攻击检测方法

获取原文
获取原文并翻译 | 示例

摘要

Supervisory Control and Data Acquisition (SCADA) systems are a core part of industrial systems, such as smart grid power and water distribution systems. In recent years, such systems become highly vulnerable to cyber attacks. The design of efficient and accurate data-driven anomaly detection models become an important topic of interest relating to the development of SCADA-specific Intrusion Detection Systems (IDSs) to counter cyber attacks. This paper proposes two novel techniques: (ⅰ) an automatic identification of consistent and inconsistent states of SCADA data for any given system, and (ⅱ) an automatic extraction of proximity detection rules from identified states. During the identification phase, the density factor for the k-nearest neighbours of an observation is adapted to compute its inconsistency score. Then, an optimal inconsistency threshold is calculated to separate inconsistent from consistent observations. During the extraction phase, the well-known fixed-width clustering technique is extended to extract proximity-detection rules, which forms a small and most-representative data set for both inconsistent and consistent behaviours in the training data set. Extensive experiments were carried out both on real as well as simulated data sets, and we show that the proposed techniques provide significant accuracy and efficiency in detecting cyber attacks, compared to three well-known anomaly detection approaches.
机译:监控和数据采集(SCADA)系统是工业系统的核心部分,例如智能电网电力和水分配系统。近年来,此类系统变得非常容易受到网络攻击。高效,准确的数据驱动异常检测模型的设计已成为与开发SCADA专用入侵检测系统(IDS)对抗网络攻击相关的重要课题。本文提出了两种新颖的技术:(ⅰ)自动识别任何给定系统的SCADA数据的一致和不一致状态,以及(ⅱ)从识别出的状态中自动提取接近度检测规则。在识别阶段,观察值的k个最近邻居的密度因子适用于计算其不一致分数。然后,计算最佳不一致阈值以将不一致的观察结果与一致的观察结果分开。在提取阶段,扩展了众所周知的固定宽度聚类技术以提取接近度检测规则,该规则针对训练数据集中的不一致和一致行为形成了一个较小且最具代表性的数据集。在真实数据集和模拟数据集上都进行了广泛的实验,我们证明,与三种众所周知的异常检测方法相比,所提出的技术在检测网络攻击方面提供了显着的准确性和效率。

著录项

  • 来源
    《Computers & Security》 |2014年第10期|94-110|共17页
  • 作者单位

    School of Computer Science and Information Technology, RMIT University, Melbourne, Vic. 3001, Australia,Faculty of Computing and IT King Abdulaziz University, Jeddah, Saudi Arabia;

    School of Electrical and Computer Engineering, RMIT University, Melbourne, Vic. 3001, Australia;

    School of Computer Science and Information Technology, RMIT University, Melbourne, Vic. 3001, Australia;

    School of Computer Science and Information Technology, RMIT University, Melbourne, Vic. 3001, Australia,Department of Computer Science, Al-Baha University, Al-Baha City, Saudi Arabia;

    School of Computer Science and Information Technology, RMIT University, Melbourne, Vic. 3001, Australia;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Unsupervised detection; Cyber-warfare; SCADA systems; Intrusion Detection System; Consistent/Inconsistent SCADA; Patterns;

    机译:无监督检测;网络战;SCADA系统;入侵侦测系统;SCADA一致/不一致;模式;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号