Abdul Samiah , Muhammad Azmi Umer , Shama Siddiqui
{"title":"基于决策树的工业控制系统入侵检测不变量","authors":"Abdul Samiah , Muhammad Azmi Umer , Shama Siddiqui","doi":"10.1016/j.cose.2025.104511","DOIUrl":null,"url":null,"abstract":"<div><div>The proliferation of interconnected Industrial Control Systems (ICS) and their connectivity with internet is expanding the attack surface, making them vulnerable to cyber-threats such as ransomware, malware, and targeted attacks. A cyber-attack launched on a critical infrastructure (CI), such as a water treatment plant, chemical plants or power grid could lead to anomalous behavior. Due to dynamic nature and variety of attributes in cyber data, the detection and prevention of these anomalous behavior is still an open challenge. Cyber physical systems (CPS) includes both the information technology (IT) and operational technology (OT) data. The detection of anomalous behavior is possible using both the IT and the OT data. The study conducted here has used the OT data. A supervised machine learning technique based on decision trees was used to mine the invariants from the OT data. The proposed approach was also compared with the Association Rule Mining (ARM) for generating invariants. The entire study was conducted in the context of scaled down version of water distribution plant (WaDi). The validation of generated invariants was performed using the operational plant and also using the physics of the plant.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"156 ","pages":"Article 104511"},"PeriodicalIF":4.8000,"publicationDate":"2025-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Decision tree based invariants for intrusion detection in industrial control system\",\"authors\":\"Abdul Samiah , Muhammad Azmi Umer , Shama Siddiqui\",\"doi\":\"10.1016/j.cose.2025.104511\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The proliferation of interconnected Industrial Control Systems (ICS) and their connectivity with internet is expanding the attack surface, making them vulnerable to cyber-threats such as ransomware, malware, and targeted attacks. A cyber-attack launched on a critical infrastructure (CI), such as a water treatment plant, chemical plants or power grid could lead to anomalous behavior. Due to dynamic nature and variety of attributes in cyber data, the detection and prevention of these anomalous behavior is still an open challenge. Cyber physical systems (CPS) includes both the information technology (IT) and operational technology (OT) data. The detection of anomalous behavior is possible using both the IT and the OT data. The study conducted here has used the OT data. A supervised machine learning technique based on decision trees was used to mine the invariants from the OT data. The proposed approach was also compared with the Association Rule Mining (ARM) for generating invariants. The entire study was conducted in the context of scaled down version of water distribution plant (WaDi). The validation of generated invariants was performed using the operational plant and also using the physics of the plant.</div></div>\",\"PeriodicalId\":51004,\"journal\":{\"name\":\"Computers & Security\",\"volume\":\"156 \",\"pages\":\"Article 104511\"},\"PeriodicalIF\":4.8000,\"publicationDate\":\"2025-05-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0167404825002007\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825002007","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Decision tree based invariants for intrusion detection in industrial control system
The proliferation of interconnected Industrial Control Systems (ICS) and their connectivity with internet is expanding the attack surface, making them vulnerable to cyber-threats such as ransomware, malware, and targeted attacks. A cyber-attack launched on a critical infrastructure (CI), such as a water treatment plant, chemical plants or power grid could lead to anomalous behavior. Due to dynamic nature and variety of attributes in cyber data, the detection and prevention of these anomalous behavior is still an open challenge. Cyber physical systems (CPS) includes both the information technology (IT) and operational technology (OT) data. The detection of anomalous behavior is possible using both the IT and the OT data. The study conducted here has used the OT data. A supervised machine learning technique based on decision trees was used to mine the invariants from the OT data. The proposed approach was also compared with the Association Rule Mining (ARM) for generating invariants. The entire study was conducted in the context of scaled down version of water distribution plant (WaDi). The validation of generated invariants was performed using the operational plant and also using the physics of the plant.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.