Dongping Zhang, Mengting Wang, Yuzhen Bu, Jiabin Yu, Li Yang
{"title":"PdGAT-ID: An intrusion detection method for industrial control systems based on periodic extraction and spatiotemporal graph attention","authors":"Dongping Zhang, Mengting Wang, Yuzhen Bu, Jiabin Yu, Li Yang","doi":"10.1016/j.cose.2024.104210","DOIUrl":null,"url":null,"abstract":"<div><div>The stable operation of Industrial Control Systems (ICS) is critical to industrial production. However, with the advancement of industrialization and informatization, ICS face increasing security threats, particularly from cyber-attacks. As a core technology for ICS security, intrusion detection has garnered significant attention in recent years. Traditional intrusion detection methods typically rely on models constructed from network event logs, but these methods have notable limitations in capturing the spatiotemporal correlations among multiple variables (sensors/actuators) and the periodicity of data within the system. To address these challenges, this paper proposes an ICS intrusion detection method, PdGAT-ID, which integrates periodicity extraction with spatiotemporal graph attention networks. This method aggregates multi-scale periodic information from time series and utilizes spatiotemporal graph attention networks to capture the system's spatiotemporal features, thereby enhancing the accuracy and reliability of detection. Experimental results on three publicly available datasets, SWaT, WADI, and Gas Pipeline Dataset, demonstrate that PdGAT-ID performs exceptionally well in detecting abnormal behaviors and intrusion events. Specifically, its F1 score outperforms the best existing models by 1.55 % to 5.51 %, significantly improving the effectiveness and reliability of ICS anomaly detection.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"149 ","pages":"Article 104210"},"PeriodicalIF":4.8000,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404824005169","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The stable operation of Industrial Control Systems (ICS) is critical to industrial production. However, with the advancement of industrialization and informatization, ICS face increasing security threats, particularly from cyber-attacks. As a core technology for ICS security, intrusion detection has garnered significant attention in recent years. Traditional intrusion detection methods typically rely on models constructed from network event logs, but these methods have notable limitations in capturing the spatiotemporal correlations among multiple variables (sensors/actuators) and the periodicity of data within the system. To address these challenges, this paper proposes an ICS intrusion detection method, PdGAT-ID, which integrates periodicity extraction with spatiotemporal graph attention networks. This method aggregates multi-scale periodic information from time series and utilizes spatiotemporal graph attention networks to capture the system's spatiotemporal features, thereby enhancing the accuracy and reliability of detection. Experimental results on three publicly available datasets, SWaT, WADI, and Gas Pipeline Dataset, demonstrate that PdGAT-ID performs exceptionally well in detecting abnormal behaviors and intrusion events. Specifically, its F1 score outperforms the best existing models by 1.55 % to 5.51 %, significantly improving the effectiveness and reliability of ICS anomaly detection.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.