Adamsky, Florian ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Soua, Ridha ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Engel, Thomas ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
External co-authors :
yes
Language :
English
Title :
Machine Learning for Reliable Network Attack Detection in SCADA Systems
Publication date :
2018
Event name :
17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom 18)
Event place :
New York, United States
Event date :
08-2018
Audience :
International
Main work title :
17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18)
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
European Projects :
H2020 - 700581 - ATENA - Advanced Tools to assEss and mitigate the criticality of ICT compoNents and their dependencies over Critical InfrAstructures
E. Byres, "The Air Gap: SCADA's Enduring Security Myth, " Communications of the ACM, vol. 56, no. 8, pp. 29-31, Aug. 2013. [Online]. Available: http://doi. acm. org/10. 1145/2492007. 2492018
C. S. Wright. (2011, September) SCADA: Air Gaps Do Not Exist. Accessed: 2017-12-04. [Online]. Available: http://infosecisland. com/ blogview/16770-SCADA-Air-Gaps-Do-Not-Exist. html
V. M. Igure, S. A. Laughter, and R. D. Williams, "Security Issues in SCADA Networks, " Elsevier Computers & Security, vol. 25, no. 7, pp. 498-506, 2006.
"IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3), " IEEE Std 1815-2012 (Revision of IEEE Std 1815-2010), pp. 1-821, Oct 2012.
N. R. Rodofile, K. Radke, and E. Foo, "Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy, " in Proceedings of the 13th Australasian Information Security Conference (AISC 2015), 2015, pp. 67-70.
P. Maynard, K. McLaughlin, and B. Haberler, "Towards Understanding Man-In-The-Middle Attacks on IEC 60870-5-104 SCADA Networks, " in Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014), Sep. 2014. [Online]. Available: http://ewic. bcs. org/content/ConWebDoc/53228
F. Adamsky, M. Aubigny, F. Battisti, M. Carli, F. Cimorelli, T. Cruz, A. G. Di, C. Foglietta, A. Galli, A. Giuseppi, F. Liberati, A. Neri, S. Panzieri, F. Pascucci, J. Proença, P. Pucci, L. Rosa, and R. Soua, "Integrated Protection of Industrial Control Systems from Cyber-attacks: the ATENA Approach, " International Journal of Critical Infrastructure Protection, p. In print, 2018.
S. W. A.-H. Baddar, A. Merlo, and M. Migliardi, "Anomaly detection in computer networks: A state-of-the-art review. " JoWUA, vol. 5, no. 4, pp. 29-64, 2014.
S. East, J. Butts, M. Papa, and S. Shenoi, "A Taxonomy of Attacks on the DNP3 Protocol, " in International Conference on Critical Infrastructure Protection. Springer Berlin Heidelberg, 2009, pp. 67-81.
"Industrial Control System (ICS) Cyber Attack Datasets, " https://sites. google. com/a/uah. edu/tommy-morris-uah/ics-data-sets, accessed: 2017-12-04.
I. Turnipseed, "A New Scada Dataset For Intrusion Detection Research, " M. Sc., Mississippi State University, August 2015.
T. Morris and W. Gao, "Industrial Control System Traffic Data Sets for Intrusion Detection Research, " Advances in Information and Communication Technology Critical Infrastructure Protection VIII, pp. 65-78, 2014.
J. Bergstra and Y. Bengio, "Random Search for Hyper-Parameter Optimization, " The Journal of Machine Learning Research, vol. 13, no. Feb, pp. 281-305, 2012.
"Machine learning techniques for Intrusion Detection in SCADA Systems, " https://github. com/Rocionightwater/ML-NIDS-for-SCADA. git.
A. George, "Anomaly Detection Based on Machine Learning: Dimensionality Reduction using PCA and Classification using SVM, " International Journal of Computer Applications, vol. 47, no. 21, 2012.
G. Wang, J. Hao, J. Ma, and L. Huang, "A new Approach to Intrusion Detection using Artificial Neural Networks and Fuzzy Clustering, " An International Journal of Expert Systems with Applications, vol. 37, no. 9, pp. 6225-6232, 2010.
J. Zhang and M. Zulkernine, "A Hybrid Network Intrusion Detection Technique using Random Forests, " in The First International Conference on Availability, Reliability and Security. IEEE, 2006, pp. 8-pp.
J. Kim, J. Kim, H. L. T. Thu, and H. Kim, "Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection, " in Proceedings of the International Conference on Platform Technology and Service (PlatCon). IEEE, 2016, pp. 1-5.
Y. Yang, K. McLaughlin, T. Littler, S. Sezer, B. Pranggono, and H. Wang, "Intrusion detection system for iec 60870-5-104 based scada networks, " in Power and Energy Society General Meeting (PES), 2013 IEEE. IEEE, 2013, pp. 1-5.
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, and A. Valdes, "Using model-based intrusion detection for scada networks, " in Proceedings of the SCADA security scientific symposium, vol. 46. Citeseer, 2007, pp. 1-12.
L. A. Maglaras and J. Jiang, "Intrusion Detection In SCADA Systems using Machine Learning Techniques, " in Science and Information Conference (SAI), 2014, 2014, pp. 626-631.
A. F. S. Prisco and M. J. F. Duitama, "Intrusion detection system for scada platforms through machine learning algorithms, " in Communications and Computing (COLCOM), 2017 IEEE Colombian Conference on. IEEE, 2017, pp. 1-6.
P. Nader, P. Honeine, and P. Beauseroy, "lp-norms in one-class classification for intrusion detection in scada systems, " IEEE Transactions on Industrial Informatics, vol. 10, no. 4, pp. 2308-2317, 2014.
N. Sayegh, I. H. Elhajj, A. Kayssi, and A. Chehab, "Scada intrusion detection system based on temporal behavior of frequent patterns, " in Electrotechnical Conference (MELECON), 2014 17th IEEE Mediterranean. IEEE, 2014, pp. 432-438.