2022
DOI: 10.3390/info13070322
|View full text |Cite
|
Sign up to set email alerts
|

An Intrusion Detection Method for Industrial Control System Based on Machine Learning

Abstract: The integration of communication networks and the internet of industrial control in Industrial Control System (ICS) increases their vulnerability to cyber attacks, causing devastating outcomes. Traditional Intrusion Detection Systems (IDS) largely rely on predefined models and are trained mostly on specific cyber attacks, which means the traditional IDS cannot cope with unknown attacks. Additionally, most IDS do not consider the imbalanced nature of ICS datasets, thus suffering from low accuracy and high False… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 34 publications
0
0
0
Order By: Relevance
“…Since the patterns of the attacks are not defnable with the exact and complete details (in the case of signature-based IDSs) and the system may make a mistake in detecting an attack (in the case of anomaly-based IDSs), there are numerous situations that the IDS incorrectly alerts for an existing attack or a suspicious packet while the Internet trafc resembles an attack pattern but no attack is happening [4]. Tese alerts are called false-positive alerts, and the problem they raise is called the false-positive alerts problem.…”
Section: Introductionmentioning
confidence: 99%
“…Since the patterns of the attacks are not defnable with the exact and complete details (in the case of signature-based IDSs) and the system may make a mistake in detecting an attack (in the case of anomaly-based IDSs), there are numerous situations that the IDS incorrectly alerts for an existing attack or a suspicious packet while the Internet trafc resembles an attack pattern but no attack is happening [4]. Tese alerts are called false-positive alerts, and the problem they raise is called the false-positive alerts problem.…”
Section: Introductionmentioning
confidence: 99%
“…Specialized IDS tools dedicated to OT are already offered on the market. Machine learning based approaches are still being explored, such as the hybrid system for distinguishing between attacks with known signatures, attacks with unknown signatures, and normal network traffic described in [59]. The third solution, on the other hand, is specific to control systems.…”
mentioning
confidence: 99%