Applying methods of machine learning in the task of intrusion detection based on the analysis of industrial process state and ICS networking

Modern industrial control systems (ICS) are increasingly becoming targets of cyber attacks. Traditional security tools based on a signature approach are not always able to detect a new attack, the signature of which has not yet been described. In particular, this occurs during targeted attacks on in...

Full description

Bibliographic Details
Main Authors: Sokolov Alexander N., Pyatnitsky Ilya A., Alabugin Sergei K.
Format: Article
Language:English
Published: University of Belgrade - Faculty of Mechanical Engineering, Belgrade 2019-01-01
Series:FME Transactions
Subjects:
Online Access:https://scindeks-clanci.ceon.rs/data/pdf/1451-2092/2019/1451-20921904782S.pdf
_version_ 1819043716441047040
author Sokolov Alexander N.
Pyatnitsky Ilya A.
Alabugin Sergei K.
author_facet Sokolov Alexander N.
Pyatnitsky Ilya A.
Alabugin Sergei K.
author_sort Sokolov Alexander N.
collection DOAJ
description Modern industrial control systems (ICS) are increasingly becoming targets of cyber attacks. Traditional security tools based on a signature approach are not always able to detect a new attack, the signature of which has not yet been described. In particular, this occurs during targeted attacks on industrial facilities. Cyber attacks can cause anomalies in the operation of an industrial control system and process equipment under its control. Therefore, to detect attacks, it is advisable to use an approach based on the detection of anomalies. A reasonable way to implement this approach is to use machine learning techniques. The paper deals with the most common methods of machine learning (decision tree algorithms, linear algorithms, support vector machine) and neural networks. To assess their applicability in the problem of detection of ICS anomalies, the Additional Tennessee Eastman Process Simulation Data for Anomaly Detection Evaluation and Gas Pipeline datasets were used.
first_indexed 2024-12-21T10:01:12Z
format Article
id doaj.art-5c8366afde70410b8bb8b3cb8a991c7e
institution Directory Open Access Journal
issn 1451-2092
2406-128X
language English
last_indexed 2024-12-21T10:01:12Z
publishDate 2019-01-01
publisher University of Belgrade - Faculty of Mechanical Engineering, Belgrade
record_format Article
series FME Transactions
spelling doaj.art-5c8366afde70410b8bb8b3cb8a991c7e2022-12-21T19:07:57ZengUniversity of Belgrade - Faculty of Mechanical Engineering, BelgradeFME Transactions1451-20922406-128X2019-01-014747827891451-20921904782SApplying methods of machine learning in the task of intrusion detection based on the analysis of industrial process state and ICS networkingSokolov Alexander N.0Pyatnitsky Ilya A.1Alabugin Sergei K.2South Ural State University, School of Electrical Engineering and Computer Science, Information Security Department, Chelyabinsk, RussiaSouth Ural State University, School of Electrical Engineering and Computer Science, Information Security Department, Chelyabinsk, RussiaSouth Ural State University, School of Electrical Engineering and Computer Science, Information Security Department, Chelyabinsk, RussiaModern industrial control systems (ICS) are increasingly becoming targets of cyber attacks. Traditional security tools based on a signature approach are not always able to detect a new attack, the signature of which has not yet been described. In particular, this occurs during targeted attacks on industrial facilities. Cyber attacks can cause anomalies in the operation of an industrial control system and process equipment under its control. Therefore, to detect attacks, it is advisable to use an approach based on the detection of anomalies. A reasonable way to implement this approach is to use machine learning techniques. The paper deals with the most common methods of machine learning (decision tree algorithms, linear algorithms, support vector machine) and neural networks. To assess their applicability in the problem of detection of ICS anomalies, the Additional Tennessee Eastman Process Simulation Data for Anomaly Detection Evaluation and Gas Pipeline datasets were used.https://scindeks-clanci.ceon.rs/data/pdf/1451-2092/2019/1451-20921904782S.pdfics securityintrusion detectionmachine learningneural networksanomaly detection
spellingShingle Sokolov Alexander N.
Pyatnitsky Ilya A.
Alabugin Sergei K.
Applying methods of machine learning in the task of intrusion detection based on the analysis of industrial process state and ICS networking
FME Transactions
ics security
intrusion detection
machine learning
neural networks
anomaly detection
title Applying methods of machine learning in the task of intrusion detection based on the analysis of industrial process state and ICS networking
title_full Applying methods of machine learning in the task of intrusion detection based on the analysis of industrial process state and ICS networking
title_fullStr Applying methods of machine learning in the task of intrusion detection based on the analysis of industrial process state and ICS networking
title_full_unstemmed Applying methods of machine learning in the task of intrusion detection based on the analysis of industrial process state and ICS networking
title_short Applying methods of machine learning in the task of intrusion detection based on the analysis of industrial process state and ICS networking
title_sort applying methods of machine learning in the task of intrusion detection based on the analysis of industrial process state and ics networking
topic ics security
intrusion detection
machine learning
neural networks
anomaly detection
url https://scindeks-clanci.ceon.rs/data/pdf/1451-2092/2019/1451-20921904782S.pdf
work_keys_str_mv AT sokolovalexandern applyingmethodsofmachinelearninginthetaskofintrusiondetectionbasedontheanalysisofindustrialprocessstateandicsnetworking
AT pyatnitskyilyaa applyingmethodsofmachinelearninginthetaskofintrusiondetectionbasedontheanalysisofindustrialprocessstateandicsnetworking
AT alabuginsergeik applyingmethodsofmachinelearninginthetaskofintrusiondetectionbasedontheanalysisofindustrialprocessstateandicsnetworking