Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part I

Due to the complexity of components and the diversity of protocols in industrial control systems, it is difficult to simply use content-based anomaly detection system with the background. This paper proposes an improved Zoe algorithm. In the algorithm, the similarity between traffics is calculated through sequence coverage. And we use Count-Mean-Min Sketch to store and count the sub-strings. Finally, we utilize clustering to achieve the anomaly detection of the industrial control system. The experimental results show that this algorithm can achieve higher detection rate and lower false positive rate of anomaly detection in industrial control systems.

[1]  Eike Kiltz,et al.  A Modular Analysis of the Fujisaki-Okamoto Transformation , 2017, TCC.

[2]  Muhammad Munwar Iqbal,et al.  Enhanced Network Anomaly Detection Based on Deep Neural Networks , 2018, IEEE Access.

[3]  Robert J. McEliece,et al.  A public key cryptosystem based on algebraic coding theory , 1978 .

[4]  Yang Wei,et al.  Anomaly Intrusion Detection Approach Using Hybrid MLP/CNN Neural Network , 2006, Sixth International Conference on Intelligent Systems Design and Applications.

[5]  Yiqiang Sheng,et al.  HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection , 2018, IEEE Access.

[6]  Venkatesan Guruswami,et al.  Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.

[7]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[8]  Ruud Pellikaan,et al.  On the Efficient Decoding of Algebraic-Geometric Codes , 1993 .

[9]  Christiane Peters,et al.  Information-Set Decoding for Linear Codes over Fq , 2010, PQCrypto.

[10]  Yang Yu,et al.  Session-Based Network Intrusion Detection Using a Deep Learning Architecture , 2017, MDAI.

[11]  Xin-Wen Wu,et al.  Efficient root-finding algorithm with application to list decoding of Algebraic-Geometric codes , 2001, IEEE Trans. Inf. Theory.

[12]  Laurence T. Yang,et al.  An Improved Stacked Auto-Encoder for Network Traffic Flow Classification , 2018, IEEE Network.

[13]  Edgar Martínez-Moro,et al.  Computational aspects of retrieving a representation of an algebraic geometry code , 2014, J. Symb. Comput..

[14]  Fang Liu,et al.  Machine Learning Combining with Visualization for Intrusion Detection: A Survey , 2016, MDAI.

[15]  Ruud Pellikaan,et al.  On the decoding of algebraic-geometric codes , 1995, IEEE Trans. Inf. Theory.

[16]  Zhenlong Yuan,et al.  DroidDetector: Android Malware Characterization and Detection Using Deep Learning , 2016 .

[17]  R. McEliece The Guruswami-Sudan Decoding Algorithm for Reed-Solomon Codes , 2003 .

[18]  Nan Jiang,et al.  Localization Scheme for Wireless Sensor Networks Based on "Shortcut" Constraint , 2015, Ad Hoc Sens. Wirel. Networks.

[19]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[20]  Eugene Prange,et al.  The use of information sets in decoding cyclic codes , 1962, IRE Trans. Inf. Theory.

[21]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[22]  Alain Couvreur,et al.  Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and Their Subcodes , 2017, IEEE Transactions on Information Theory.

[23]  Ruud Pellikaan,et al.  On decoding by error location and dependent sets of error positions , 1992, Discret. Math..

[24]  Elwyn R. Berlekamp,et al.  On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[25]  cedric. faure Cryptanalysis of the McEliece cryptosystem over hyperelliptic codes , 2008 .

[26]  Joseph H. Silverman,et al.  The arithmetic of elliptic curves , 1986, Graduate texts in mathematics.

[27]  Edgar Martínez-Moro,et al.  On the unique representation of very strong algebraic geometry codes , 2014, Des. Codes Cryptogr..

[28]  Stanislav Bulygin,et al.  On lower bounds for information set decoding over Fq and on the effect of partial knowledge , 2017 .

[29]  Oscar Moreno,et al.  McEliece public key cryptosystems using algebraic-geometric codes , 1996 .

[30]  Christopher Leckie,et al.  High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning , 2016, Pattern Recognit..

[31]  Ling Gao,et al.  A Cooperative Deep Belief Network for Intrusion Detection , 2018, 2018 Sixth International Conference on Advanced Cloud and Big Data (CBD).

[32]  José Antonio Lozano,et al.  Sensitivity Analysis of k-Fold Cross Validation in Prediction Error Estimation , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[33]  V. Sidelnikov,et al.  On insecurity of cryptosystems based on generalized Reed-Solomon codes , 1992 .

[34]  Virender Ranga,et al.  Statistical analysis of CIDDS-001 dataset for Network Intrusion Detection Systems using Distance-based Machine Learning , 2018 .

[35]  Yong Wang,et al.  Intrusion Detection Method based on Deep Learning , 2021, 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom).

[36]  Ali A. Ghorbani,et al.  Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..

[37]  Morgan Barbier,et al.  Key reduction of McEliece's cryptosystem using list decoding , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[38]  Amin Shokrollahi,et al.  List Decoding of Algebraic-Geometric Codes , 1999, IEEE Trans. Inf. Theory.

[39]  Tanja Lange,et al.  Attacking and defending the McEliece cryptosystem , 2008, IACR Cryptol. ePrint Arch..

[40]  Qi Cheng,et al.  Hard Problems of Algebraic Geometry Codes , 2005, IEEE Transactions on Information Theory.

[41]  Venkatesan Guruswami,et al.  On Representations of Algebraic-Geometric Codes for List Decoding , 2000, ESA.

[42]  Madhu Sudan,et al.  Decoding of Reed Solomon Codes beyond the Error-Correction Bound , 1997, J. Complex..

[43]  Adel Sabry Eesa,et al.  A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems , 2015, Expert Syst. Appl..

[44]  Bin Li,et al.  C-POEM: comprehensive performance optimization evaluation model for wireless sensor networks , 2017, Soft Comput..

[45]  Lorenz Minder,et al.  Cryptography based on error correcting codes , 2007 .