Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithmsopen access

Authors
Obonna, Ugochukwu OnyekachiOpara, Felix KelechiMbaocha, Christian ChidiebereObichere, Jude-Kennedy ChibuzoAkwukwaegbu, Isdore OnyemaAmaefule, Miriam MmesomaNwakanma, Cosmas Ifeanyi
Issue Date
Aug-2023
Publisher
MDPI
Keywords
amorphous cyber-attacks; process control network; anomaly detection; machine learning; man-in-the-middle attacks; SCADA
Citation
FUTURE INTERNET, v.15, no.8
Journal Title
FUTURE INTERNET
Volume
15
Number
8
URI
https://scholarworks.bwise.kr/kumoh/handle/2020.sw.kumoh/28447
DOI
10.3390/fi15080280
ISSN
1999-5903
Abstract
Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this may have largely been caused by the integration of open network to operation technology (OT) as a result of low-cost network expansion. The connection of OT to the internet for firmware updates, third-party support, or the intervention of vendors has exposed the industry to attacks. The inability to detect these unpredictable cyber-attacks exposes the PCN, and a successful attack can lead to devastating effects. This paper reviews the different forms of cyber-attacks in PCN of oil and gas installations while proposing the use of machine learning algorithms to monitor data exchanges between the sensors, controllers, processes, and the final control elements on the network to detect anomalies in such data exchanges. Python 3.0 Libraries, Deep-Learning Toolkit, MATLAB, and Allen Bradley RSLogic 5000 PLC Emulator software were used in simulating the process control. The outcomes of the experiments show the reliability and functionality of the different machine learning algorithms in detecting these anomalies with significant precise attack detections identified using tree algorithms (bagged or coarse ) for man-in-the-middle (MitM) attacks while taking note of accuracy-computation complexity trade-offs.
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE