A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks

Contemporary Smart Power Systems (SPNs) depend on Cyber-Physical Systems (CPSs) to connect physical devices and control tools. Developing a robust privacy-conserving intrusion detection method involves network and physical data regarding the setups, such as Supervisory Control and Data Acquisition (SCADA), for defending real data and recognizing cyber-attacks. A key issue in the implementation of SPNs is the security against cyber-attacks, targeting to interrupt SCADA operations and violate data privacy over the usage of penetration and data poisoning attacks. In this paper, a privacy-conserving framework, so-called PC-IDS, is proposed for realizing the privacy and safety features of SPNs through hybrid machine learning approach. The framework includes two key components. Primarily, a data pre-processing component is proposed for cleaning and transforming actual data into a different layout that accomplishes the aim of privacy conservation. Then, an intrusion detection component is proposed using a particle swarm optimization-based probabilistic neural network for the identification and recognition of malicious events. The performance of PC-IDS framework is evaluated by means of two commonly available datasets, i.e. the Power System and UNSW-NB15 datasets. The experimental outcomes highlight that the framework can proficiently protect data of SPNs and determine anomalous behaviours compared to numerous recent compelling state-of-the-art methods with respect to false positive rate (FPR), detection rate (DR) and computational processing time (CPT) by achieving 96.03% of DR, 0.18% FPR for Power System dataset and 95.91% of DR, 0.14% FPR for UNSW-NB15 dataset.

[1]  Christopher D. McDermott,et al.  Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks. , 2017 .

[2]  Osmar R. Zaïane,et al.  Privacy Preserving Clustering by Data Transformation , 2010, J. Inf. Data Manag..

[3]  Sumeet Dua,et al.  Data Mining and Machine Learning in Cybersecurity , 2011 .

[4]  Adnan Shaout,et al.  An intelligent intrusion detection system , 2019, Applied Intelligence.

[5]  Dechang Pi,et al.  HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems , 2019, IEEE Access.

[6]  Joseph K. Liu,et al.  Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.

[7]  Jill Slay,et al.  Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks , 2019, IEEE Transactions on Big Data.

[8]  Konstantinos E. Parsopoulos,et al.  Initializing the Particle Swarm Optimizer Using the Nonlinear Simplex Method , 2002 .

[9]  Sabina Jeschke,et al.  Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applications , 2017 .

[10]  Hadis Karimipour,et al.  An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System , 2020, IEEE Access.

[11]  Kannan Krithivasan,et al.  Detection of Cyberattacks in Industrial Control Systems Using Enhanced Principal Component Analysis and Hypergraph-Based Convolution Neural Network (EPCA-HG-CNN) , 2020, IEEE Transactions on Industry Applications.

[12]  Athanasios V. Vasilakos,et al.  False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.

[13]  Yasha Zeinali,et al.  Competitive probabilistic neural network , 2017, Integr. Comput. Aided Eng..

[14]  Glenn A. Fink,et al.  Security and Privacy in Cyber-Physical Systems , 2017 .

[15]  Asif Nawaz,et al.  Efficient behaviour specification and bidirectional gated recurrent units‐based intrusion detection method for industrial control systems , 2020 .

[16]  Keke Gai,et al.  Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid , 2019, IEEE Transactions on Industrial Informatics.

[17]  Qiang Li,et al.  iFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting , 2020, IEEE Journal on Selected Areas in Communications.

[18]  Xin Xie,et al.  Multivariate Abnormal Detection for Industrial Control Systems Using 1D CNN and GRU , 2020, IEEE Access.

[19]  Yu-Lin He,et al.  Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..

[20]  A. Gandomi,et al.  Probabilistic neural networks , 2020, Handbook of Probabilistic Models.

[21]  Bin Luo,et al.  Privacy‐preserving multisource transfer learning in intrusion detection system , 2020, Trans. Emerg. Telecommun. Technol..

[22]  Russell C. Eberhart,et al.  A new optimizer using particle swarm theory , 1995, MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science.

[23]  Benjamin Turnbull,et al.  A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks , 2021, IEEE Internet of Things Journal.

[24]  Maurice Clerc,et al.  The particle swarm - explosion, stability, and convergence in a multidimensional complex space , 2002, IEEE Trans. Evol. Comput..

[25]  Xiangjian He,et al.  Detection of Denial-of-Service Attacks Based on Computer Vision Techniques , 2015, IEEE Transactions on Computers.

[26]  Zhao Yang Dong,et al.  Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks , 2019, IEEE Transactions on Smart Grid.

[27]  Raymond K. Wong,et al.  Insider Threat Detection with Long Short-Term Memory , 2019, ACSW.

[28]  N. Nagaveni,et al.  Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario , 2013, Inf. Sci..

[29]  Jill Slay,et al.  The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..

[30]  Koji Nakao,et al.  Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities , 2009, IEICE Trans. Inf. Syst..

[31]  Ünal Çavusoglu,et al.  A new hybrid approach for intrusion detection using machine learning methods , 2019, Applied Intelligence.

[32]  Elena Sitnikova,et al.  Privacy preservation intrusion detection technique for SCADA systems , 2017, 2017 Military Communications and Information Systems Conference (MilCIS).

[33]  Yong Wang,et al.  MalInsight: A systematic profiling based malware detection framework , 2019, J. Netw. Comput. Appl..

[34]  Biplab Sikdar,et al.  An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication , 2019, IEEE Transactions on Smart Grid.

[35]  Byeong Man Kim,et al.  A layer-wise Perturbation based Privacy Preserving Deep Neural Networks , 2019, 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).

[36]  George J. Pappas,et al.  Differential privacy in control and network systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[37]  An Yang,et al.  Detecting stealthy attacks on industrial control systems using a permutation entropy-based method , 2020, Future Gener. Comput. Syst..

[38]  Zahir Tari,et al.  PPFSCADA: Privacy preserving framework for SCADA data publishing , 2014, Future Gener. Comput. Syst..

[39]  Jiankun Hu,et al.  An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems , 2019, IEEE Transactions on Sustainable Computing.

[40]  Rebecca Petersen Data Mining for Network Intrusion Detection : A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks , 2015 .

[41]  Donald F. Specht,et al.  Probabilistic neural networks , 1990, Neural Networks.

[42]  Kuan-Ching Li,et al.  An intrusion detection approach based on improved deep belief network , 2020, Applied Intelligence.

[43]  Xiangjian He,et al.  Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.

[44]  Zuyi Li,et al.  Impacts of Bad Data on the PMU based Line Outage Detection , 2015, ArXiv.

[45]  Nour Moustafa,et al.  UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).

[46]  Jiankun Hu,et al.  A holistic review of Network Anomaly Detection Systems: A comprehensive survey , 2019, J. Netw. Comput. Appl..

[47]  Mohsen Guizani,et al.  Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities , 2019, IEEE Internet of Things Journal.