An Intrusion Detection Method for Industrial Control System Based on Machine Learning

نویسندگان

چکیده

The integration of communication networks and the internet industrial control in Industrial Control System (ICS) increases their vulnerability to cyber attacks, causing devastating outcomes. Traditional Intrusion Detection Systems (IDS) largely rely on predefined models are trained mostly specific which means traditional IDS cannot cope with unknown attacks. Additionally, most do not consider imbalanced nature ICS datasets, thus suffering from low accuracy high False Positive Rates when being put use. In this paper, we propose NCO–double-layer DIFF_RF–OPFYTHON intrusion detection method for ICS, consists NCO modules, double-layer DIFF_RF OPFYTHON modules. Detected traffic will be divided into three categories by module: known normal traffic. Then, attacks classified module according feature attack Finally, use improve model input enhance model. results show that proposed outperforms methods, such as XGboost SVM. is also considerable. dataset used paper reaches 98.13%. rates reach 98.21% 95.1%, respectively. Moreover, has achieved suitable other public datasets.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Hybrid Machine Learning Method for Intrusion Detection

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

متن کامل

An Efficient Extreme Learning Machine based Intrusion Detection System

This paper presents an intrusion detection technique based on online sequential extreme learning machine. For performance evaluation, KDDCUP99 dataset is used. In this paper, we use three feature selection techniques – filtered subset evaluation, CFS subset evaluation and consistency subset evaluation to eliminate redundant features. Two network traffic profiling techniques are used. Alpha prof...

متن کامل

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus

The network intrusion is becoming a big threat for a lot of companies, organization and so on. Recent intrusions are becoming more clever and difficult to detect. Many of today’s intrusion detection systems are based on signature-based. They have good performance for known attacks, but theoretically they are not able to detect unknown attacks. On the other hand, an anomaly detection system can ...

متن کامل

A Machine Learning Based Intrusion Detection System for Software Defined

As an inevitable trend of future 5G networks, Software Defined architecture has many advantages in providing centralized control and flexible resource management. But it is also confronted with various security challenges and potential threats with emerging services and technologies. As the focus of network security, Intrusion Detection Systems (IDS) are usually deployed separately without coll...

متن کامل

development and implementation of an optimized control strategy for induction machine in an electric vehicle

in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information

سال: 2022

ISSN: ['2078-2489']

DOI: https://doi.org/10.3390/info13070322