A Passive Testing Approach using a Semi-Supervised Intrusion Detection Model for SCADA Network Traffic

Herbert Muehlburger, F. Wotawa
{"title":"A Passive Testing Approach using a Semi-Supervised Intrusion Detection Model for SCADA Network Traffic","authors":"Herbert Muehlburger, F. Wotawa","doi":"10.1109/AITest55621.2022.00015","DOIUrl":null,"url":null,"abstract":"Worldwide cyber-attacks constantly threaten the security of available infrastructure relying on cyber-physical systems. Infrastructure companies use passive testing approaches such as anomaly-based intrusion detection systems to observe such systems and prevent attacks. However, the effectiveness of intrusion detection systems depends on the underlying models used for detecting attacks and the observations that may suffer from scarce data availability. Hence, we need research on a) passive testing methods for obtaining appropriate detection models and b) for analysing the impact of the scarceness of data for improving intrusion detection systems. In this paper, we contribute to these challenges. We build on former work on supervised intrusion detection of power grid substation SCADA network traffic where a real-world data set (APG data set) is available. In contrast to previous work, we use a semi-supervised model with recurrent neural network architectures (i.e., LSTM Autoencoders and sequence models). This model only considers samples of ordinary data traffic without attacks to learn an adequate detection model. We outline the underlying foundations regarding the machine learning approach used. Furthermore, we present and discuss the obtained experimental results and compare them with prior results on supervised machine learning approaches. The source code of this work is available at:https: //github.com/muehlburger/semi-supervised-intrusion-detection-scada","PeriodicalId":427386,"journal":{"name":"2022 IEEE International Conference On Artificial Intelligence Testing (AITest)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference On Artificial Intelligence Testing (AITest)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AITest55621.2022.00015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Worldwide cyber-attacks constantly threaten the security of available infrastructure relying on cyber-physical systems. Infrastructure companies use passive testing approaches such as anomaly-based intrusion detection systems to observe such systems and prevent attacks. However, the effectiveness of intrusion detection systems depends on the underlying models used for detecting attacks and the observations that may suffer from scarce data availability. Hence, we need research on a) passive testing methods for obtaining appropriate detection models and b) for analysing the impact of the scarceness of data for improving intrusion detection systems. In this paper, we contribute to these challenges. We build on former work on supervised intrusion detection of power grid substation SCADA network traffic where a real-world data set (APG data set) is available. In contrast to previous work, we use a semi-supervised model with recurrent neural network architectures (i.e., LSTM Autoencoders and sequence models). This model only considers samples of ordinary data traffic without attacks to learn an adequate detection model. We outline the underlying foundations regarding the machine learning approach used. Furthermore, we present and discuss the obtained experimental results and compare them with prior results on supervised machine learning approaches. The source code of this work is available at:https: //github.com/muehlburger/semi-supervised-intrusion-detection-scada
基于半监督入侵检测模型的SCADA网络流量被动测试方法
全球范围内的网络攻击不断威胁着依赖于网络物理系统的可用基础设施的安全。基础设施公司使用被动测试方法,例如基于异常的入侵检测系统来观察此类系统并防止攻击。然而,入侵检测系统的有效性取决于用于检测攻击的底层模型和可能受到稀缺数据可用性影响的观察结果。因此,我们需要研究a)被动测试方法,以获得合适的检测模型;b)分析数据稀缺对入侵检测系统的影响,以改进入侵检测系统。在本文中,我们为这些挑战做出了贡献。我们建立在电网变电站SCADA网络流量的监督入侵检测的基础上,其中有一个真实世界的数据集(APG数据集)可用。与之前的工作相比,我们使用了带有循环神经网络架构的半监督模型(即LSTM自编码器和序列模型)。该模型只考虑没有攻击的普通数据流量样本,以学习到合适的检测模型。我们概述了所使用的机器学习方法的基本基础。此外,我们提出并讨论了获得的实验结果,并将其与先前在监督机器学习方法上的结果进行了比较。这项工作的源代码可在:https: //github.com/muehlburger/semi-supervised-intrusion-detection-scada
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信