Ahmed F. Shosha, P. Gladyshev, Shinn-Shyan Wu, Chen-Ching Liu
{"title":"基于多智能体协作的SCADA网络入侵检测","authors":"Ahmed F. Shosha, P. Gladyshev, Shinn-Shyan Wu, Chen-Ching Liu","doi":"10.1109/ISAP.2011.6082170","DOIUrl":null,"url":null,"abstract":"Current SCADA (Supervisory Control and Data Acquisition) system architecture increases the interconnectivity to/from other distributed networks and services. In addition, within the SCADA networks there are different types of sub-networks and protocols that are used to monitor and control industrial operations. This complex expansion increases the productivity of SCADA networks; however, it also increases security risks and threats. The state-of-the-art Intrusion Detection Systems (IDSs) are not capable enough of detecting anomalies and intrusions that may be aimed to disrupt the SCADA operations. This paper proposes a Distributed Intrusion Detection System (DIDS) based on a community collaboration between multiple agents of anomaly detectors to identify anomaly behaviors in SCADA networks. The proposed architecture for DIDS incorporates the SCADA network topology and connectivity constraints. In this paper, detailed architecture, components, and functions of DIDS are described and attack scenarios are developed to validate the effectiveness of the proposed methodology","PeriodicalId":424662,"journal":{"name":"2011 16th International Conference on Intelligent System Applications to Power Systems","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"22","resultStr":"{\"title\":\"Detecting cyber intrusions in SCADA networks using multi-agent collaboration\",\"authors\":\"Ahmed F. Shosha, P. Gladyshev, Shinn-Shyan Wu, Chen-Ching Liu\",\"doi\":\"10.1109/ISAP.2011.6082170\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Current SCADA (Supervisory Control and Data Acquisition) system architecture increases the interconnectivity to/from other distributed networks and services. In addition, within the SCADA networks there are different types of sub-networks and protocols that are used to monitor and control industrial operations. This complex expansion increases the productivity of SCADA networks; however, it also increases security risks and threats. The state-of-the-art Intrusion Detection Systems (IDSs) are not capable enough of detecting anomalies and intrusions that may be aimed to disrupt the SCADA operations. This paper proposes a Distributed Intrusion Detection System (DIDS) based on a community collaboration between multiple agents of anomaly detectors to identify anomaly behaviors in SCADA networks. The proposed architecture for DIDS incorporates the SCADA network topology and connectivity constraints. In this paper, detailed architecture, components, and functions of DIDS are described and attack scenarios are developed to validate the effectiveness of the proposed methodology\",\"PeriodicalId\":424662,\"journal\":{\"name\":\"2011 16th International Conference on Intelligent System Applications to Power Systems\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-11-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"22\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 16th International Conference on Intelligent System Applications to Power Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISAP.2011.6082170\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 16th International Conference on Intelligent System Applications to Power Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISAP.2011.6082170","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detecting cyber intrusions in SCADA networks using multi-agent collaboration
Current SCADA (Supervisory Control and Data Acquisition) system architecture increases the interconnectivity to/from other distributed networks and services. In addition, within the SCADA networks there are different types of sub-networks and protocols that are used to monitor and control industrial operations. This complex expansion increases the productivity of SCADA networks; however, it also increases security risks and threats. The state-of-the-art Intrusion Detection Systems (IDSs) are not capable enough of detecting anomalies and intrusions that may be aimed to disrupt the SCADA operations. This paper proposes a Distributed Intrusion Detection System (DIDS) based on a community collaboration between multiple agents of anomaly detectors to identify anomaly behaviors in SCADA networks. The proposed architecture for DIDS incorporates the SCADA network topology and connectivity constraints. In this paper, detailed architecture, components, and functions of DIDS are described and attack scenarios are developed to validate the effectiveness of the proposed methodology