An Adaptive Machine Learning-based Threat Detection Framework for Industrial Communication Networks

The development in sophisticated sensory devices has largely revolutionized industrial control systems (ICS). With the popularity of the fourth industrial revolution, which is also referred to as Industry 4.0, more large-scale industrial communication systems are being interconnected by leveraging information communication technology (ICT) paradigms. These new paradigms have resulted in a sustainable improvement in the conventional production systems by facilitating timely and enhanced production rates. The ICS embeds service oriented architecture (SOA), which comprise of supervisory control and data acquisition (SCADA) systems as its backbone. However, such systems have often fallen prey to cyber-attacks leading to temporary failures or complete physical damage to the ICS. In this perspective, this work suggests the adoption of particle swarm optimization (PSO) method and artificial neural network (ANN) model for identifying cyber-attacks associated with ICS. This work considers the gas pipeline control system data to assess the efficacy of the proposed approach in conjunction with other models. It is observed that the proposed approach provides a prediction accuracy of 98.87 % and respective precision and recall values of 97.80 % and 95.79 %.

[1]  Bibudhendu Pati,et al.  A Robust Energy Optimization and Data Reduction Scheme for IoT Based Indoor Environments Using Local Processing Framework , 2020, Journal of Network and Systems Management.

[2]  Hadis Karimipour,et al.  An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System , 2020, IEEE Access.

[3]  Amit Kumar Jaiswal,et al.  Evidence of power-law behavior in cognitive IoT applications , 2020, Neural Computing and Applications.

[4]  Sujit Bebortta,et al.  Classification of pathological disorders in children using random forest algorithm , 2020, 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE).

[5]  Angelo Corallo,et al.  Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts , 2020, Comput. Ind..

[6]  Stamatis Voliotis,et al.  Tackling Faults in the Industry 4.0 Era—A Survey of Machine-Learning Solutions and Key Aspects , 2019, Sensors.

[7]  Mariko Fujimoto,et al.  Cyber Security Risk Assessment on Industry 4.0 using ICS testbed with AI and Cloud , 2019, 2019 IEEE Conference on Application, Information and Network Security (AINS).

[8]  Mounir Rifi,et al.  An Evaluation of Machine Learning Algorithms To Detect Attacks in Scada Network , 2019, 2019 7th Mediterranean Congress of Telecommunications (CMT).

[9]  Giuseppe Aceto,et al.  A Survey on Information and Communication Technologies for Industry 4.0: State-of-the-Art, Taxonomies, Perspectives, and Challenges , 2019, IEEE Communications Surveys & Tutorials.

[10]  Hans D. Schotten,et al.  Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests , 2019, 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM).

[11]  Deniz Ünal,et al.  Comparison of Data Mining Classification Algorithms Determining the Default Risk , 2019, Sci. Program..

[12]  Mohammed Samaka,et al.  SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach , 2018, Future Internet.

[13]  Hong Zhou,et al.  Artificial Neural Network , 2020, Encyclopedia of GIS.

[14]  Alyani Ismail,et al.  A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization , 2018, IEEE Access.

[15]  Kyriakos Stefanidis,et al.  An HMM-Based Anomaly Detection Approach for SCADA Systems , 2016, WISTP.

[16]  David Hutchison,et al.  Evaluation of Anomaly Detection techniques for SCADA communication resilience , 2016, 2016 Resilience Week (RWS).

[17]  Wei Gao,et al.  Industrial Control System Traffic Data Sets for Intrusion Detection Research , 2014, Critical Infrastructure Protection.

[18]  Mark A. Buckner,et al.  An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications , 2013, 2013 12th International Conference on Machine Learning and Applications.

[19]  A. Roli Artificial Neural Networks , 2012, Lecture Notes in Computer Science.

[20]  Wei Gao,et al.  A control system testbed to validate critical infrastructure protection concepts , 2011, Int. J. Crit. Infrastructure Prot..

[21]  James Kennedy,et al.  Defining a Standard for Particle Swarm Optimization , 2007, 2007 IEEE Swarm Intelligence Symposium.

[22]  Mark Goadrich,et al.  The relationship between Precision-Recall and ROC curves , 2006, ICML.

[23]  Peter H. Sydenham,et al.  Handbook of Measuring System Design , 2005 .

[24]  James Kennedy,et al.  Particle swarm optimization , 2002, Proceedings of ICNN'95 - International Conference on Neural Networks.

[25]  Bibudhendu Pati,et al.  A Real-Time Smart Waste Management Based on Cognitive IoT Framework , 2020 .

[26]  Amit Kumar Singh,et al.  Characterization of Range for Smart Home Sensors Using Tsallis’ Entropy Framework , 2020 .

[27]  Ian P. Turnipseed,et al.  Industrial Control System Simulation and Data Logging for Intrusion Detection System Research , 2015 .