Using Data Mining Methods to Detect Simulated Intrusions on a Modbus Network

Szu-Chuang Li, Yennun Huang, Bo-Chen Tai, Chi Lin
{"title":"Using Data Mining Methods to Detect Simulated Intrusions on a Modbus Network","authors":"Szu-Chuang Li, Yennun Huang, Bo-Chen Tai, Chi Lin","doi":"10.1109/SC2.2017.29","DOIUrl":null,"url":null,"abstract":"In the era of Industry 4.0 we seek to create a smart factory environment in which everything is connected and well coordinated. Smart factories will also be connected to cloud service and/or all kinds of partners outside the boundary of the factory to achieve even better efficiency. However network connectivity also brings threats along with the promise of better efficiency, and makes Smart factories more vulnerable to intruders. There were already security incidents such as Iran's nuclear facilities' infection by the Stuxnet virus and German's steel mill destroyed by hackers in 2014. To protect smart factories from such threats traditional means of intrusion detection on the Internet could be used, but we must also refine them and have them adapted to the context of Industry 4.0. For example, network traffic in a smart factory might be more uniformed and predictable compared to the traffic on the Internet, but one should tolerate much less anomaly as the traffic is usually mission critical, and will cause much more loss once intrusion happens. The most widely used signature-based intrusion detection systems come with a large library of signatures that contains known attack have been proved to be very useful, but without the ability to detect unknown attack. We turn to supervised data mining algorithms to detect intrusions, which will help us to detect intrusions with similar properties with known attacks but not necessarily fully match the signatures in the library. In this study a simulated smart factory environment was built and a series of attacks were implemented. Neural network and decision trees were used to classify the traffic generated from this simulated environment. From the experiments we conclude that for the data set we used, decision tree performed better than neural network for detecting intrusion as it provides better accuracy, lower false negative rate and faster model building time.","PeriodicalId":188326,"journal":{"name":"2017 IEEE 7th International Symposium on Cloud and Service Computing (SC2)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 7th International Symposium on Cloud and Service Computing (SC2)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SC2.2017.29","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

In the era of Industry 4.0 we seek to create a smart factory environment in which everything is connected and well coordinated. Smart factories will also be connected to cloud service and/or all kinds of partners outside the boundary of the factory to achieve even better efficiency. However network connectivity also brings threats along with the promise of better efficiency, and makes Smart factories more vulnerable to intruders. There were already security incidents such as Iran's nuclear facilities' infection by the Stuxnet virus and German's steel mill destroyed by hackers in 2014. To protect smart factories from such threats traditional means of intrusion detection on the Internet could be used, but we must also refine them and have them adapted to the context of Industry 4.0. For example, network traffic in a smart factory might be more uniformed and predictable compared to the traffic on the Internet, but one should tolerate much less anomaly as the traffic is usually mission critical, and will cause much more loss once intrusion happens. The most widely used signature-based intrusion detection systems come with a large library of signatures that contains known attack have been proved to be very useful, but without the ability to detect unknown attack. We turn to supervised data mining algorithms to detect intrusions, which will help us to detect intrusions with similar properties with known attacks but not necessarily fully match the signatures in the library. In this study a simulated smart factory environment was built and a series of attacks were implemented. Neural network and decision trees were used to classify the traffic generated from this simulated environment. From the experiments we conclude that for the data set we used, decision tree performed better than neural network for detecting intrusion as it provides better accuracy, lower false negative rate and faster model building time.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于数据挖掘方法的Modbus网络模拟入侵检测
在工业4.0时代,我们寻求创造一个智能工厂环境,在这个环境中,一切都是连接和协调的。智能工厂还将与云服务和/或工厂边界外的各种合作伙伴连接,以实现更高的效率。然而,网络连接在提高效率的同时也带来了威胁,并使智能工厂更容易受到入侵者的攻击。伊朗核设施被Stuxnet病毒感染,德国钢铁厂在2014年被黑客摧毁等安全事件已经发生。为了保护智能工厂免受此类威胁,可以使用传统的互联网入侵检测手段,但我们也必须对其进行改进,并使其适应工业4.0的背景。例如,与Internet上的流量相比,智能工厂中的网络流量可能更加统一和可预测,但由于流量通常是关键任务,因此应该容忍更少的异常,并且一旦发生入侵将造成更大的损失。目前使用最广泛的基于签名的入侵检测系统都带有大量的签名库,这些签名库包含已知的攻击已被证明是非常有用的,但没有检测未知攻击的能力。我们转向监督数据挖掘算法来检测入侵,这将帮助我们检测与已知攻击具有相似属性的入侵,但不一定完全匹配库中的签名。在本研究中,建立了一个模拟的智能工厂环境,并实施了一系列攻击。利用神经网络和决策树对模拟环境中产生的流量进行分类。从实验中我们得出结论,对于我们使用的数据集,决策树在检测入侵方面比神经网络表现得更好,因为它提供了更高的准确性,更低的假阴性率和更快的模型构建时间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Multilayered Cloud Applications Autoscaling Performance Estimation Optimal Placement of Network Security Monitoring Functions in NFV-Enabled Data Centers Application-Aware Traffic Redirection: A Mobile Edge Computing Implementation Toward Future 5G Networks A Mobile Cloud-Based Biofeedback Platform for Evaluating Medication Response Platform-as-a-Service for Human-Based Applications: Ontology-Driven Approach
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1