DEIDS: a novel intrusion detection system for industrial control systems

نویسندگان

چکیده

Abstract Owing to the development of industrial production, hidden danger in control systems (ICSs) has considerably increased, causing challenges traditional safety defense methods. The combination machine-learning or deep-learning algorithms and intrusion detection (IDSs) become mainstream method for solving this problem. However, these methods depend on a massive amount high-quality attack traffic data, which cannot be obtained easily owing independence unique characteristics ICSs. In study, we apply reconstructed convolutional neural network data expansion algorithm named CenterBorderline_SMOTE ( CB_SMOTE ) an IDS propose system DEIDS ). is end-to-end model that learns representative features from raw classifies them unified framework. Moreover, adopt classification activation map structure, can deeply mine potential enhance effectiveness features. While enhancing quality, introduce designed into expand solve problem insufficient system. Our comprehensive experiments different open datasets indicate achieves excellent performance (97 $$\%$$ % accuracy) outperforms state-of-the-art experimental results also show our high efficiency accuracy processing ICSs datasets.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Side-channel based intrusion detection for industrial control systems

Industrial Control Systems are under increased scrutiny. Their security is historically sub-par, and although measures are being taken by the manufacturers to remedy this, the large installed base of legacy systems cannot easily be updated with state-of-the-art security measures. We propose a system that uses electromagnetic side-channel measurements to detect behavioural changes of the softwar...

متن کامل

Industrial Control System Traffic Data Sets for Intrusion Detection Research

Supervisory control and data acquisition (SCADA) systems monitor and control physical processes associated with the critical infrastructure. Weaknesses in the application layer protocols, however, leave SCADA networks vulnerable to attack. In response, cyber security researchers have developed myriad intrusion detection systems. Researchers primarily rely on unique threat models and the corresp...

متن کامل

Intrusion Detection based on a Novel Hybrid Learning Approach

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

متن کامل

Novel Approach for Hybrid Intrusion Detection System

This Paper titled “Novel Approach for Intrusion Detection System” is an intrusion detection system (IDS) proposed by analyzing the principle of the intrusion detection system based on host and network. Basically this paper is to develop host based cum network based intrusion detection system for Microsoft Windows XP environment. Proposed concept that had used in this was applying intrusion dete...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Neural Computing and Applications

سال: 2022

ISSN: ['0941-0643', '1433-3058']

DOI: https://doi.org/10.1007/s00521-022-06965-4