Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks

Full metadata record
DC Field Value Language
dc.contributor.authorAli, Bakht Sher-
dc.contributor.authorUllah, Inam-
dc.contributor.authorAl Shloul, Tamara-
dc.contributor.authorKhan, Izhar Ahmed-
dc.contributor.authorKhan, Ijaz-
dc.contributor.authorGhadi, Yazeed Yasin-
dc.contributor.authorAbdusalomov, Akmalbek-
dc.contributor.authorNasimov, Rashid-
dc.contributor.authorOuahada, Khmaies-
dc.contributor.authorHamam, Habib-
dc.date.accessioned2024-04-05T12:30:19Z-
dc.date.available2024-04-05T12:30:19Z-
dc.date.issued2024-04-
dc.identifier.issn0920-8542-
dc.identifier.issn1573-0484-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/90895-
dc.description.abstractThe growing volume of data, especially in cases of imbalanced datasets, has posed significant challenges in the classification process, particularly when it comes to identifying cyberattacks on industrial control systems (ICS) networks, which have been a source of concern due to the significant destructive impact of viruses such as Slammer, worms, Stuxnet, Duqu, Seismic Net, and Flame on critical infrastructures in various countries. The key challenge is constructing the intrusion detection system (IDS) framework to deal with imbalanced datasets. Many researchers work especially on binary classification, but multi-classification is a more challenging and still active research area. To deal with the multi-class imbalanced classification problem, we outline an instance-based intrusion detection technique named ICS-IDS, for intrusion detection in ICS systems specific to SCADA networks. The developed technique consists of two core components, the data preparation component, and the detection component. The data preparation component uses the normalization, Fisher Discriminant Analysis, and k-neighbor's method to scale the data, reduce the dimensionality, and resample the dataset, respectively. To learn the latent representations and discern harmful vectors from attacked data, the detection/recognition component leverages an efficient instance-based learner. The proposed ICS-IDS model outperforms existing attractive methods in detecting sophisticated attack vectors in ICS data, achieving 99% accuracy and 99% detection rates (DR) on an industrial network dataset. This proves the methodology's practicality for implementing security in real-world ICS networks.-
dc.format.extent30-
dc.language영어-
dc.language.isoENG-
dc.publisherSPRINGER-
dc.titleICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks-
dc.typeArticle-
dc.identifier.wosid001100136500004-
dc.identifier.doi10.1007/s11227-023-05764-5-
dc.identifier.bibliographicCitationJOURNAL OF SUPERCOMPUTING, v.80, no.6, pp 7876 - 7905-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-85176551369-
dc.citation.endPage7905-
dc.citation.startPage7876-
dc.citation.titleJOURNAL OF SUPERCOMPUTING-
dc.citation.volume80-
dc.citation.number6-
dc.type.docTypeArticle-
dc.publisher.location네델란드-
dc.subject.keywordAuthorBig data-
dc.subject.keywordAuthorCyber security-
dc.subject.keywordAuthorSCADA-
dc.subject.keywordAuthorIntrusion detection-
dc.subject.keywordAuthorMachine learning-
dc.subject.keywordAuthorDeep learning-
dc.subject.keywordPlusCLASSIFICATION-
dc.subject.keywordPlusPREDICTION-
dc.subject.keywordPlusMACHINE-
dc.subject.keywordPlusSMOTE-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher ULLAH, INAM photo

ULLAH, INAM
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE