A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data

Attack detection problems in industrial control systems (ICSs) are commonly known as a network traffic monitoring scheme for detecting abnormal activities. However, a network-based intrusion detection system can be deceived by attackers that imitate the system’s normal activity. In this work, we pro...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Electronics (Basel) 2021, Vol.10 (4), p.407
Hauptverfasser: Mokhtari, Sohrab, Abbaspour, Alireza, Yen, Kang K., Sargolzaei, Arman
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 4
container_start_page 407
container_title Electronics (Basel)
container_volume 10
creator Mokhtari, Sohrab
Abbaspour, Alireza
Yen, Kang K.
Sargolzaei, Arman
description Attack detection problems in industrial control systems (ICSs) are commonly known as a network traffic monitoring scheme for detecting abnormal activities. However, a network-based intrusion detection system can be deceived by attackers that imitate the system’s normal activity. In this work, we proposed a novel solution to this problem based on measurement data in the supervisory control and data acquisition (SCADA) system. The proposed approach is called measurement intrusion detection system (MIDS), which enables the system to detect any abnormal activity in the system even if the attacker tries to conceal it in the system’s control layer. A supervised machine learning model is generated to classify normal and abnormal activities in an ICS to evaluate the MIDS performance. A hardware-in-the-loop (HIL) testbed is developed to simulate the power generation units and exploit the attack dataset. In the proposed approach, we applied several machine learning models on the dataset, which show remarkable performances in detecting the dataset’s anomalies, especially stealthy attacks. The results show that the random forest is performing better than other classifier algorithms in detecting anomalies based on measured data in the testbed.
doi_str_mv 10.3390/electronics10040407
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2489050808</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2489050808</sourcerecordid><originalsourceid>FETCH-LOGICAL-c322t-a6cf0bec00f5a29bd57aa66a7580ab88773ae74f00c5b00bd1c466621b1a3e3d3</originalsourceid><addsrcrecordid>eNptkE1PwzAMhiMEEtPYL-ASiXPBTfp5LBsfkzZxAM6Vm7qQqU1Gkh327wkaBw7YB7-yXvmRX8auU7iVsoY7GkkFZ41WPgXIYpdnbCagrJNa1OL8j75kC-93EKtOZSVhxnTDt6g-tSG-IXRGmw_e7PfOxiUfrOONsROOR76iEDHaGq4NX5v-4IPTOPKlNRE-8tejDzR5fo-eeh5tW0J_cDSRCXyFAa_YxYCjp8XvnLP3x4e35XOyeXlaL5tNoqQQIcFCDdCRAhhyFHXX5yViUWCZV4BdVZWlRCqzAUDlHUDXpyorikKkXYqSZC_n7OZ0Nz7xdSAf2p09OBORrciqGnKooIoueXIpZ713NLR7pyd0xzaF9ifW9p9Y5TesMG7P</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2489050808</pqid></control><display><type>article</type><title>A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Mokhtari, Sohrab ; Abbaspour, Alireza ; Yen, Kang K. ; Sargolzaei, Arman</creator><creatorcontrib>Mokhtari, Sohrab ; Abbaspour, Alireza ; Yen, Kang K. ; Sargolzaei, Arman</creatorcontrib><description>Attack detection problems in industrial control systems (ICSs) are commonly known as a network traffic monitoring scheme for detecting abnormal activities. However, a network-based intrusion detection system can be deceived by attackers that imitate the system’s normal activity. In this work, we proposed a novel solution to this problem based on measurement data in the supervisory control and data acquisition (SCADA) system. The proposed approach is called measurement intrusion detection system (MIDS), which enables the system to detect any abnormal activity in the system even if the attacker tries to conceal it in the system’s control layer. A supervised machine learning model is generated to classify normal and abnormal activities in an ICS to evaluate the MIDS performance. A hardware-in-the-loop (HIL) testbed is developed to simulate the power generation units and exploit the attack dataset. In the proposed approach, we applied several machine learning models on the dataset, which show remarkable performances in detecting the dataset’s anomalies, especially stealthy attacks. The results show that the random forest is performing better than other classifier algorithms in detecting anomalies based on measured data in the testbed.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics10040407</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Algorithms ; Anomalies ; Automation ; Communication ; Communications networks ; Communications traffic ; Control systems ; Data encryption ; Datasets ; Distributed control systems ; Electric power generation ; Hardware-in-the-loop simulation ; Industrial electronics ; Infrastructure ; Intrusion detection systems ; Machine learning ; Network security ; Performance evaluation ; Power plants ; Supervisory control and data acquisition ; Virtual private networks</subject><ispartof>Electronics (Basel), 2021, Vol.10 (4), p.407</ispartof><rights>2021. This work is licensed under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c322t-a6cf0bec00f5a29bd57aa66a7580ab88773ae74f00c5b00bd1c466621b1a3e3d3</citedby><cites>FETCH-LOGICAL-c322t-a6cf0bec00f5a29bd57aa66a7580ab88773ae74f00c5b00bd1c466621b1a3e3d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,4010,27900,27901,27902</link.rule.ids></links><search><creatorcontrib>Mokhtari, Sohrab</creatorcontrib><creatorcontrib>Abbaspour, Alireza</creatorcontrib><creatorcontrib>Yen, Kang K.</creatorcontrib><creatorcontrib>Sargolzaei, Arman</creatorcontrib><title>A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data</title><title>Electronics (Basel)</title><description>Attack detection problems in industrial control systems (ICSs) are commonly known as a network traffic monitoring scheme for detecting abnormal activities. However, a network-based intrusion detection system can be deceived by attackers that imitate the system’s normal activity. In this work, we proposed a novel solution to this problem based on measurement data in the supervisory control and data acquisition (SCADA) system. The proposed approach is called measurement intrusion detection system (MIDS), which enables the system to detect any abnormal activity in the system even if the attacker tries to conceal it in the system’s control layer. A supervised machine learning model is generated to classify normal and abnormal activities in an ICS to evaluate the MIDS performance. A hardware-in-the-loop (HIL) testbed is developed to simulate the power generation units and exploit the attack dataset. In the proposed approach, we applied several machine learning models on the dataset, which show remarkable performances in detecting the dataset’s anomalies, especially stealthy attacks. The results show that the random forest is performing better than other classifier algorithms in detecting anomalies based on measured data in the testbed.</description><subject>Algorithms</subject><subject>Anomalies</subject><subject>Automation</subject><subject>Communication</subject><subject>Communications networks</subject><subject>Communications traffic</subject><subject>Control systems</subject><subject>Data encryption</subject><subject>Datasets</subject><subject>Distributed control systems</subject><subject>Electric power generation</subject><subject>Hardware-in-the-loop simulation</subject><subject>Industrial electronics</subject><subject>Infrastructure</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Network security</subject><subject>Performance evaluation</subject><subject>Power plants</subject><subject>Supervisory control and data acquisition</subject><subject>Virtual private networks</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNptkE1PwzAMhiMEEtPYL-ASiXPBTfp5LBsfkzZxAM6Vm7qQqU1Gkh327wkaBw7YB7-yXvmRX8auU7iVsoY7GkkFZ41WPgXIYpdnbCagrJNa1OL8j75kC-93EKtOZSVhxnTDt6g-tSG-IXRGmw_e7PfOxiUfrOONsROOR76iEDHaGq4NX5v-4IPTOPKlNRE-8tejDzR5fo-eeh5tW0J_cDSRCXyFAa_YxYCjp8XvnLP3x4e35XOyeXlaL5tNoqQQIcFCDdCRAhhyFHXX5yViUWCZV4BdVZWlRCqzAUDlHUDXpyorikKkXYqSZC_n7OZ0Nz7xdSAf2p09OBORrciqGnKooIoueXIpZ713NLR7pyd0xzaF9ifW9p9Y5TesMG7P</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Mokhtari, Sohrab</creator><creator>Abbaspour, Alireza</creator><creator>Yen, Kang K.</creator><creator>Sargolzaei, Arman</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>2021</creationdate><title>A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data</title><author>Mokhtari, Sohrab ; Abbaspour, Alireza ; Yen, Kang K. ; Sargolzaei, Arman</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c322t-a6cf0bec00f5a29bd57aa66a7580ab88773ae74f00c5b00bd1c466621b1a3e3d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Anomalies</topic><topic>Automation</topic><topic>Communication</topic><topic>Communications networks</topic><topic>Communications traffic</topic><topic>Control systems</topic><topic>Data encryption</topic><topic>Datasets</topic><topic>Distributed control systems</topic><topic>Electric power generation</topic><topic>Hardware-in-the-loop simulation</topic><topic>Industrial electronics</topic><topic>Infrastructure</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Network security</topic><topic>Performance evaluation</topic><topic>Power plants</topic><topic>Supervisory control and data acquisition</topic><topic>Virtual private networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mokhtari, Sohrab</creatorcontrib><creatorcontrib>Abbaspour, Alireza</creatorcontrib><creatorcontrib>Yen, Kang K.</creatorcontrib><creatorcontrib>Sargolzaei, Arman</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mokhtari, Sohrab</au><au>Abbaspour, Alireza</au><au>Yen, Kang K.</au><au>Sargolzaei, Arman</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data</atitle><jtitle>Electronics (Basel)</jtitle><date>2021</date><risdate>2021</risdate><volume>10</volume><issue>4</issue><spage>407</spage><pages>407-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>Attack detection problems in industrial control systems (ICSs) are commonly known as a network traffic monitoring scheme for detecting abnormal activities. However, a network-based intrusion detection system can be deceived by attackers that imitate the system’s normal activity. In this work, we proposed a novel solution to this problem based on measurement data in the supervisory control and data acquisition (SCADA) system. The proposed approach is called measurement intrusion detection system (MIDS), which enables the system to detect any abnormal activity in the system even if the attacker tries to conceal it in the system’s control layer. A supervised machine learning model is generated to classify normal and abnormal activities in an ICS to evaluate the MIDS performance. A hardware-in-the-loop (HIL) testbed is developed to simulate the power generation units and exploit the attack dataset. In the proposed approach, we applied several machine learning models on the dataset, which show remarkable performances in detecting the dataset’s anomalies, especially stealthy attacks. The results show that the random forest is performing better than other classifier algorithms in detecting anomalies based on measured data in the testbed.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics10040407</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2079-9292
ispartof Electronics (Basel), 2021, Vol.10 (4), p.407
issn 2079-9292
2079-9292
language eng
recordid cdi_proquest_journals_2489050808
source MDPI - Multidisciplinary Digital Publishing Institute; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Algorithms
Anomalies
Automation
Communication
Communications networks
Communications traffic
Control systems
Data encryption
Datasets
Distributed control systems
Electric power generation
Hardware-in-the-loop simulation
Industrial electronics
Infrastructure
Intrusion detection systems
Machine learning
Network security
Performance evaluation
Power plants
Supervisory control and data acquisition
Virtual private networks
title A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T06%3A38%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Machine%20Learning%20Approach%20for%20Anomaly%20Detection%20in%20Industrial%20Control%20Systems%20Based%20on%20Measurement%20Data&rft.jtitle=Electronics%20(Basel)&rft.au=Mokhtari,%20Sohrab&rft.date=2021&rft.volume=10&rft.issue=4&rft.spage=407&rft.pages=407-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics10040407&rft_dat=%3Cproquest_cross%3E2489050808%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2489050808&rft_id=info:pmid/&rfr_iscdi=true