基于深度卷积网络及K均值的工控系统入侵检测研究
Research on Intrusion Detection of Industrial Control System Based on Deep Convolution Network and K-Means
摘要:
随着物联网与智能制造的兴起,工业控制系统的信息安全问题亦日渐受到重视,尤其是公共安全控制要地受到网络攻击后极易导致城市生活网络的瘫痪。为避免严重的网络攻击灾害,本项目对入侵IDS进行深入研究,提出基于深度卷积网络及K均值的工控系统入侵检测方法。实验结果显示,在衢州某水库数据集上,本方法在效能指标上优于其它方法。
Abstract:
With the rise of the Internet of things and intelligent manufacturing, the information security of industrial control system has been paid more and more attention, especially when the public security control points are attacked by network. It is easy to lead to the paralysis of urban living network. In order to avoid serious network attacks disaster, this project makes an indepth study on intrusion IDS, and proposes an intrusion detection method of industrial control system based on deep convolution network and k-means. Experimental results show that this method is superior to other methods in most performance indicators on a data set of a reservoir in Quzhou.
参考文献
|
[1]
|
Zheng, Z. and Reddy, A.L.N. (2017) Safeguarding Building Automation Networks: THE-Driven Anomaly Detector Based on Traffic Analysis. 2017 26th International Conference on Computer Communication and Networks (ICCCN), Vancouver, BC, 31 July-3 August 2017, 1-11. [Google Scholar] [CrossRef]
|
|
[2]
|
Chalapathy, R., Menon, A.K. and Chawla, S. (2020) Anomaly Detection Using One Class Neural Networks. arXiv preprint arXiv,2020.1802.06360
|
|
[3]
|
White, J.S., Fitsimmons, T. and Matthews, J.N. (2013) Quantitative Analysis of Intrusion Detection Systems: Snort and Suricata. SPIE Defense Security & Sensing Cyber Security Conference, Baltimore, 875704. [Google Scholar] [CrossRef]
|
|
[4]
|
Nisioti, A., Mylonas, A., Katos, V., et al. (2017) You Can Run But You Cannot Hide from Memory: Extracting IM Evidence of Android Apps. 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, 3-6 July 2017, 457-464. [Google Scholar] [CrossRef]
|
|
[5]
|
Wan, M., Shang, W. and Zeng, P. (2017) Double Behavior Characteristics for One Class Classification Anomaly Detection in Networked Control Systems. IEEE Transactions on Information Forensics and Security, 12, 3011-3023. [Google Scholar] [CrossRef]
|
|
[6]
|
Mantere, M., Sailio, M. and Noponen, S. (2014) A Module for Anomaly Detection in ICS Networks. The Proceedings of the 3rd International Conference on High Confidence Net-worked Systems, Berlin, April 2014, 49-56. [Google Scholar] [CrossRef]
|
|
[7]
|
张文安, 洪榛, 朱俊威. 工业控制系统网络入侵检测方法综述[J]. 控制与决策, 2021(11): 2277-2288.
|