8
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Hierarchical Online Intrusion Detection for SCADA Networks

      Preprint
      , , , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          We propose a novel hierarchical online intrusion detection system (HOIDS) for supervisory control and data acquisition (SCADA) networks based on machine learning algorithms. By utilizing the server-client topology while keeping clients distributed for global protection, high detection rate is achieved with minimum network impact. We implement accurate models of normal-abnormal binary detection and multi-attack identification based on logistic regression and quasi-Newton optimization algorithm using the Broyden-Fletcher-Goldfarb-Shanno approach. The detection system is capable of accelerating detection by information gain based feature selection or principle component analysis based dimension reduction. By evaluating our system using the KDD99 dataset and the industrial control system dataset, we demonstrate that HOIDS is highly scalable, efficient and cost effective for securing SCADA infrastructures.

          Related collections

          Most cited references11

          • Record: found
          • Abstract: not found
          • Article: not found

          Stuxnet: Dissecting a Cyberwarfare Weapon

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              SCADA security in the light of Cyber-Warfare

                Bookmark

                Author and article information

                Journal
                2016-11-28
                Article
                1611.09418
                10e290d5-fe75-40d2-9e0e-623fb6047eed

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                cs.CR

                Security & Cryptology
                Security & Cryptology

                Comments

                Comment on this article