Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks

Authors
Ali, Bakht SherUllah, InamAl Shloul, TamaraKhan, Izhar AhmedKhan, IjazGhadi, Yazeed YasinAbdusalomov, AkmalbekNasimov, RashidOuahada, KhmaiesHamam, Habib
Issue Date
Apr-2024
Publisher
SPRINGER
Keywords
Big data; Cyber security; SCADA; Intrusion detection; Machine learning; Deep learning
Citation
JOURNAL OF SUPERCOMPUTING, v.80, no.6, pp 7876 - 7905
Pages
30
Journal Title
JOURNAL OF SUPERCOMPUTING
Volume
80
Number
6
Start Page
7876
End Page
7905
URI
https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/90895
DOI
10.1007/s11227-023-05764-5
ISSN
0920-8542
1573-0484
Abstract
The growing volume of data, especially in cases of imbalanced datasets, has posed significant challenges in the classification process, particularly when it comes to identifying cyberattacks on industrial control systems (ICS) networks, which have been a source of concern due to the significant destructive impact of viruses such as Slammer, worms, Stuxnet, Duqu, Seismic Net, and Flame on critical infrastructures in various countries. The key challenge is constructing the intrusion detection system (IDS) framework to deal with imbalanced datasets. Many researchers work especially on binary classification, but multi-classification is a more challenging and still active research area. To deal with the multi-class imbalanced classification problem, we outline an instance-based intrusion detection technique named ICS-IDS, for intrusion detection in ICS systems specific to SCADA networks. The developed technique consists of two core components, the data preparation component, and the detection component. The data preparation component uses the normalization, Fisher Discriminant Analysis, and k-neighbor's method to scale the data, reduce the dimensionality, and resample the dataset, respectively. To learn the latent representations and discern harmful vectors from attacked data, the detection/recognition component leverages an efficient instance-based learner. The proposed ICS-IDS model outperforms existing attractive methods in detecting sophisticated attack vectors in ICS data, achieving 99% accuracy and 99% detection rates (DR) on an industrial network dataset. This proves the methodology's practicality for implementing security in real-world ICS networks.
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher ULLAH, INAM photo

ULLAH, INAM
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE