An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model

Industrial networks are complex and diverse. Among existing intrusion prevention systems available, several of them have problems such as low detection accuracy rate, high false positive (FP) rate, and low real-time performance for impersonation attacks. To address such issues, it is proposed in this article an industrial network intrusion detection algorithm based on multifeature data clustering optimization model, where the weighted distances and security coefficients of data are classified based on the priority threshold of data attribute feature for each node in the network, given that the data modules in the industrial network environment are diverse and easy to diagnose, restore, and rebuild. The proposed algorithm can effectively improve the detection rate and real-time performance of detecting abnormal behavior for the multifeature data in industrial networks. The novel features are twofold, to rapidly select a node with high-security coefficient as the cluster center, and match the multifeature data around the center into a cluster. Experimental results show that the proposed algorithm has good superiority in terms of detection rate and time compared to other algorithms. In the industrial network, the detection accuracy of abnormal data reaches 97.8%, and the FP of detection is decreased by 8.8%.

[1]  Muhammad Munwar Iqbal,et al.  Enhanced Network Anomaly Detection Based on Deep Neural Networks , 2018, IEEE Access.

[2]  Mingdong Tang,et al.  A Secure FaBric Blockchain-Based Data Transmission Technique for Industrial Internet-of-Things , 2019, IEEE Transactions on Industrial Informatics.

[3]  Victor O. K. Li,et al.  Online False Data Injection Attack Detection With Wavelet Transform and Deep Neural Networks , 2018, IEEE Transactions on Industrial Informatics.

[4]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[5]  Jianxin Wang,et al.  On Threshold-Free Error Detection for Industrial Wireless Sensor Networks , 2018, IEEE Transactions on Industrial Informatics.

[6]  Robert K. Cunningham,et al.  Improving Intrusion Detection Performance using Keyword Selection and Neural Networks , 2000, Recent Advances in Intrusion Detection.

[7]  Feng Jiang,et al.  Point-to-Set Distance Metric Learning on Deep Representations for Visual Tracking , 2018, IEEE Transactions on Intelligent Transportation Systems.

[8]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[9]  John Bigham,et al.  Test data for anomaly detection in the electricity infrastructure , 2006, Int. J. Crit. Infrastructures.

[10]  Qi Shi,et al.  A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[11]  Scott Ruoti,et al.  Intrusion Detection with Unsupervised Heterogeneous Ensembles Using Cluster-Based Normalization , 2017, 2017 IEEE International Conference on Web Services (ICWS).

[12]  Keqin Li,et al.  A double PUF-based RFID identity authentication protocol in service-centric internet of things environments , 2019, Inf. Sci..

[13]  Jianxin Wu,et al.  Good Practices for Learning to Recognize Actions Using FV and VLAD , 2016, IEEE Transactions on Cybernetics.

[14]  Feng Jiang,et al.  Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security , 2020, IEEE Transactions on Sustainable Computing.

[15]  Ali Dehghantanha,et al.  A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.

[16]  Xiaofeng Wang,et al.  A cloud-based experimental platform for networked industrial control systems , 2018, Int. J. Model. Simul. Sci. Comput..

[17]  Fuchun Sun,et al.  Efficient and Rapid Machine Learning Algorithms for Big Data and Dynamic Varying Systems , 2017, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[18]  Zhu Han,et al.  Machine Learning Paradigms for Next-Generation Wireless Networks , 2017, IEEE Wireless Communications.

[19]  Harish Kumar,et al.  An intrusion detection system using network traffic profiling and online sequential extreme learning machine , 2015, Expert Syst. Appl..

[20]  Yuting Su,et al.  Multiple/Single-View Human Action Recognition via Part-Induced Multitask Structural Learning , 2015, IEEE Transactions on Cybernetics.

[21]  Peng Jiang,et al.  An Intelligent Outlier Detection Method With One Class Support Tucker Machine and Genetic Algorithm Toward Big Sensor Data in Internet of Things , 2019, IEEE Transactions on Industrial Electronics.

[22]  Manisha Patil,et al.  A brief study of Wannacry Threat: Ransomware Attack 2017 , 2017 .

[23]  Elisa Bertino,et al.  Internet of Things (IoT) , 2016, ACM Trans. Internet Techn..