Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Improving anomaly detection in SCADA network communication with attribute extension
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.ORCID iD: 0000-0001-7486-5216
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.ORCID iD: 0000-0002-8929-7220
2022 (English)In: Energy Informatics, E-ISSN 2520-8942, Vol. 5, no 1, article id 69Article in journal (Refereed) Published
Abstract [en]

Network anomaly detection for critical infrastructure supervisory control and data acquisition (SCADA) systems is the first line of defense against cyber-attacks. Often hybrid methods, such as machine learning with signature-based intrusion detection methods, are employed to improve the detection results. Here an attempt is made to enhance the support vector-based outlier detection method by leveraging behavioural attribute extension of the network nodes. The network nodes are modeled as graph vertices to construct related attributes that enhance network characterisation and potentially improve unsupervised anomaly detection ability for SCADA network. IEC 104 SCADA protocol communication data with good domain fidelity is utilised for empirical testing. The results demonstrate that the proposed approach achieves significant improvements over the baseline approach (average F1F1 score increased from 0.6 to 0.9, and Matthews correlation coefficient (MCC) from 0.3 to 0.8). The achieved outcome also surpasses the unsupervised scores of related literature. For critical networks, the identification of attacks is indispensable. The result shows an insignificant missed-alert rate (0.3%0.3% on average), the lowest among related works. The gathered results show that the proposed approach can expose rouge SCADA nodes reasonably and assist in further pruning the identified unusual instances.

Place, publisher, year, edition, pages
Springer, 2022. Vol. 5, no 1, article id 69
Keywords [en]
Supervisory control and data acquisition, Network intrusion detection, Machine learning, IEC 60870-5-104, Attribute extension
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:bth-24125DOI: 10.1186/s42162-022-00252-1Scopus ID: 2-s2.0-85144520103OAI: oai:DiVA.org:bth-24125DiVA, id: diva2:1721433
Note

Open access

Available from: 2022-12-21 Created: 2022-12-21 Last updated: 2023-01-10Bibliographically approved

Open Access in DiVA

fulltext(1622 kB)120 downloads
File information
File name FULLTEXT01.pdfFile size 1622 kBChecksum SHA-512
721f773a4ca6a84d396311176e0e4fdebdb2ab03dae42cf0f3e3cad3012b34381317c342b62928b877fbe20b8449d34566e9b7cb2f52c516a49e9a3ab5a51354
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Anwar, MahwishLundberg, LarsBorg, Anton

Search in DiVA

By author/editor
Anwar, MahwishLundberg, LarsBorg, Anton
By organisation
Department of Computer Science
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 120 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 240 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf