Log in

An optimization technique for intrusion detection of industrial control network vulnerabilities based on BP neural network

  • Original article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

The aim of this research is to solve the problem that the intrusion detection model of industrial control system has low detection rate and detection efficiency against various attacks, a method of optimizing BP neural network based on Adaboost algorithm is proposed. Firstly, principal component analysis (PCA) is used to preprocess the original data set to eliminate its correlation. Secondly, Adaboost algorithm is used to continuously adjust the weight of training samples, to obtain the optimal weight and threshold of BP neural network. The results show that there are 13,817 pieces of data collected in the industrial control experiment, of which 9817 pieces of data are taken as the test data set, including 9770 pieces of normal data and 47 pieces of abnormal data. In addition, as a test data set of 4000 pieces, there are 3987 pieces of normal data and 13 pieces of abnormal data. It can be seen that the average detection rate and detection speed of the algorithm of optimizing BP neural network by Adaboost algorithm proposed in this paper are better than other algorithms on each attack type. It is proved that Adaboost algorithm can effectively solve the intrusion detection problem by optimizing BP neural network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Akpinar KO, Ozcelik I (2019) Analysis of machine learning methods in EtherCAT-based anomaly detection. IEEE Access 7:184365–184374. https://doi.org/10.1109/access.2019.2960497

    Article  Google Scholar 

  • Anton SDD, Fraunholz D, Krohmer D, Reti D, Schneider D, Schotten HD (2021) The global state of security in industrial control systems: an empirical analysis of vulnerabilities around the world. IEEE Internet Things J, pp 1–1. https://doi.org/10.1109/jiot.2021.3081741

  • Awotunde JB, Chakraborty C, Adeniyi AE (2021) Intrusion Detection in industrial internet of things network-based on deep learning model with rule-based feature selection. In: Jolfaei A (ed) Wireless communications and mobile computing, Vol 2021, pp. 1–17. Hindawi Limited. https://doi.org/10.1155/2021/7154587

  • Chen J, Chen L, Shabaz M (2021) Image fusion algorithm at pixel level based on edge detection. J Healthcare Eng 2021:1–10. https://doi.org/10.1155/2021/5760660

    Article  Google Scholar 

  • Chen T, Lin P, Ling J (2019) An intrusion detection method for industrial control system based on gate recurrent unit. J Phys Conf Series 1302(2):022016.

  • Chopra S, Dhiman G, Sharma A, Shabaz M, Shukla P, Arora M (2021) Taxonomy of adaptive neuro-fuzzy inference system in modern engineering sciences. Comput Intell Neurosci 2021:1–14. https://doi.org/10.1155/2021/6455592

    Article  Google Scholar 

  • Deshmukh S, Thirupathi Rao K, Shabaz M (2021) Collaborative learning based straggler prevention in large-scale distributed computing framework. Security Commun Netw 2021:1–9. https://doi.org/10.1155/2021/8340925

    Article  Google Scholar 

  • Fakhar A, Jahanzaib M, Sarfraz MH, Shafiq M, Rizwan A (2020) Investigating the impact of emotional intelligence on academic performance of engineering students: an exploratory study in Pakistan. The Nucleus 56(3):105–111

    Google Scholar 

  • Feng X (2020) Research on intrusion detection of industrial control system based on deep convolution network and k-means. Comput Sci Appl 10(11):2141–2146

    Google Scholar 

  • Kumari KA, Sharma A, Chakraborty C, Ananyaa M (2021) Preserving health care data security and privacy using Carmichael’s theorem-based homomorphic encryption and modified enhanced homomorphic encryption schemes in edge computing systems. Mary Ann Liebert Inc., In Big Data. https://doi.org/10.1089/big.2021.0012

    Book  Google Scholar 

  • Lai Y, Zhang J, Liu Z (2019) Industrial anomaly detection and attack classification method based on convolutional neural network. Security Commun Netw.

  • Lai Y, Gao H, Liu J (2020) Vulnerability mining method for the Modbus TCP using an anti-sample fuzzer. Sensors 20(7):2040. https://doi.org/10.3390/s20072040

    Article  Google Scholar 

  • Li Z, Zhao H, Shi J, Huang Y, **ong J (2019) An intelligent fuzzing data generation method based on deep adversarial learning. IEEE Access 7:49327–49340. https://doi.org/10.1109/access.2019.2911121

    Article  Google Scholar 

  • Nuraeni N, Astuti P, Irnawati O, Darwati I, Harmoko DD (2020) High accuracy in forex predictions using the neural network method based on particle swarm optimization. J Phys Conf Series 1641(1):012067.

  • Prasanalakshmi B, Pugalendhi GK (2019). Two-way handshake user authentication scheme for e-Banking system. In: International Conference on Intelligent Computing and Communication, pp 135–141. Springer, Singapore.

  • Prasanalakshmi B, Kannammal A, Sridevi R (2011) Multimodal biometric cryptosystem involving face, fingerprint and palm vein. Int J Comput Sci Issues (IJCSI) 8(4):604

    Google Scholar 

  • Rizwan A, Alvi MSI (2010) Analysis of factors affecting the stress level of engineering students. Int J Eng Education 26(3):681–686

    Google Scholar 

  • Sanober S, Alam I, Pande S, Arslan F, Rane KP, Singh BK, Khamparia A, Shabaz M (2021) An enhanced secure deep learning algorithm for fraud detection in wireless communication. Wirel Commun Mob Comput 2021:1–14. https://doi.org/10.1155/2021/6079582

    Article  Google Scholar 

  • Shang W, Zeng P, Wan M, Li L, An P (2015) Intrusion detection algorithm based on OCSVM in industrial control system. Security Commun Netw 9(10):1040–1049. https://doi.org/10.1002/sec.1398

  • Shang W, Zhang G, Wang T, Zhang R (2021) A test cases generation method for industrial control protocol test. Sci Program 2021:1–9. https://doi.org/10.1155/2021/6611732

    Article  Google Scholar 

  • Sharma C, Bagga A, Singh BK, Shabaz M (2021) A novel optimized graph-based transform watermarking technique to address security issues in real-time application. Math Probl Eng 2021:1–27. https://doi.org/10.1155/2021/5580098

    Article  Google Scholar 

  • Yuxia Z (2019) Optimization calculation of well function W (u, r/B) based on BP neural network. E3S Web of Conferences, 136, 04031. https://doi.org/10.1051/e3sconf/201913604031

  • Zhanwei S, Zenghui L (2019) Abnormal detection method of industrial control system based on behavior model. Comput Secur 84:166–178. https://doi.org/10.1016/j.cose.2019.03.009

    Article  Google Scholar 

Download references

Funding

This research work is self-funded.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rahul Neware.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest and all ethical issues including human or animal participation has been done. No such consent is applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

**a, W., Neware, R., Kumar, S.D. et al. An optimization technique for intrusion detection of industrial control network vulnerabilities based on BP neural network. Int J Syst Assur Eng Manag 13 (Suppl 1), 576–582 (2022). https://doi.org/10.1007/s13198-021-01541-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-021-01541-w

Keywords

Navigation