An optimization technique for intrusion detection of industrial control network vulnerabilities based on BP neural network

The aim of this research is to solve the problem that the intrusion detection model of industrial control system has low detection rate and detection efficiency against various attacks, a method of optimizing BP neural network based on Adaboost algorithm is proposed. Firstly, principal component analysis (PCA) is used to preprocess the original data set to eliminate its correlation. Secondly, Adaboost algorithm is used to continuously adjust the weight of training samples, to obtain the optimal weight and threshold of BP neural network. The results show that there are 13,817 pieces of data collected in the industrial control experiment, of which 9817 pieces of data are taken as the test data set, including 9770 pieces of normal data and 47 pieces of abnormal data. In addition, as a test data set of 4000 pieces, there are 3987 pieces of normal data and 13 pieces of abnormal data. It can be seen that the average detection rate and detection speed of the algorithm of optimizing BP neural network by Adaboost algorithm proposed in this paper are better than other algorithms on each attack type. It is proved that Adaboost algorithm can effectively solve the intrusion detection problem by optimizing BP neural network.

[1]  K. A. Kumari,et al.  Preserving Health Care Data Security and Privacy Using Carmichael's Theorem-Based Homomorphic Encryption and Modified Enhanced Homomorphic Encryption Schemes in Edge Computing Systems , 2021, Big Data.

[2]  Daniel Fraunholz,et al.  The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities Around the World , 2021, IEEE Internet of Things Journal.

[3]  Mohammad Shabaz,et al.  Taxonomy of Adaptive Neuro-Fuzzy Inference System in Modern Engineering Sciences , 2021, Comput. Intell. Neurosci..

[4]  Chinmay Chakraborty,et al.  Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection , 2021, Wirel. Commun. Mob. Comput..

[5]  Mohammad Shabaz,et al.  Image Fusion Algorithm at Pixel Level Based on Edge Detection , 2021, Journal of healthcare engineering.

[6]  Mohammad Shabaz,et al.  A New Face Image Recognition Algorithm Based on Cerebellum-Basal Ganglia Mechanism , 2021, Journal of healthcare engineering.

[7]  Shyam Deshmukh,et al.  Collaborative Learning Based Straggler Prevention in Large-Scale Distributed Computing Framework , 2021, Secur. Commun. Networks.

[8]  Chirag Sharma,et al.  A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application , 2021 .

[9]  Aditya Khamparia,et al.  An Enhanced Secure Deep Learning Algorithm for Fraud Detection in Wireless Communication , 2021, Wirel. Commun. Mob. Comput..

[10]  Subhendu Kumar Pani,et al.  MBCP: Performance Analysis of Large Scale Mainstream Blockchain Consensus Protocols , 2021, IEEE Access.

[11]  Wenli Shang,et al.  A Test Cases Generation Method for Industrial Control Protocol Test , 2021, Sci. Program..

[12]  Nia Nuraeni,et al.  High Accuracy in Forex Predictions Using the Neural Network Method Based on Particle Swarm Optimization , 2020, Journal of Physics: Conference Series.

[13]  Jing Liu,et al.  Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer , 2020, Sensors.

[14]  M. Shafiq,et al.  Investigating the Impact of Emotional Intelligence on Academic Performance of Engineering Students: An Exploratory Study in Pakistan , 2020 .

[15]  峰 徐 Research on Intrusion Detection of Industrial Control System Based on Deep Convolution Network and K-Means , 2020, Computer Science and Application.

[16]  D. P. Zegzhda,et al.  Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series , 2019, Automatic Control and Computer Sciences.

[17]  Yingxu Lai,et al.  Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network , 2019, Secur. Commun. Networks.

[18]  Peng Lin,et al.  An Intrusion Detection Method for Industrial Control System Based on Gate Recurrent Unit , 2019, Journal of Physics: Conference Series.

[19]  Zhanwei Song,et al.  Abnormal detection method of industrial control system based on behavior model , 2019, Comput. Secur..

[20]  B. Prasanalakshmi,et al.  Two-Way Handshake User Authentication Scheme for e-Banking System , 2019 .

[21]  Ibrahim Ozcelik,et al.  Analysis of Machine Learning Methods in EtherCAT-Based Anomaly Detection , 2019, IEEE Access.

[22]  Zhang Yuxia Optimization calculation of well function W (u, r/B) based on BP neural network , 2019, E3S Web of Conferences.

[23]  Hui Zhao,et al.  An Intelligent Fuzzing Data Generation Method Based on Deep Adversarial Learning , 2019, IEEE Access.

[24]  Lin Li,et al.  Intrusion detection algorithm based on OCSVM in industrial control system , 2016, Secur. Commun. Networks.

[25]  A. Kannammal,et al.  ECC Based Biometric Encryption of Compressed Image for Security over Network Channels , 2013 .

[26]  A. Kannammal,et al.  Multimodal Biometric Cryptosystem Involving Face, Fingerprint and Palm Vein , 2011 .

[27]  Moeen Rajput,et al.  Analysis of Factors Affecting the Stress Level of Engineering Students , 2010 .

[28]  M. Kohara,et al.  A test cases generation method for FSM with counters and its fault coverage evaluation using a mutant generator , 1997, 1997 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, PACRIM. 10 Years Networking the Pacific Rim, 1987-1997.