IDS Detection Based on Optimization Based on WI-CS and GNN Algorithm in SCADA Network

  • Chapter
  • First Online:
Architectural Wireless Networks Solutions and Security Issues

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 196))

Abstract

Industry control systems (ICS) are considered as one of the inevitable systems in this contemporary smart world. In that supervisory control and data acquisition (SCADA) is the centralized system that control the entire grid. When a system is considered to be a whole and sole control, obviously an uncompromised security would be the prime. By having that as a major concern, a lot of research is being done on IDS security. In spite of that it has several cons including increased fake positive and fake negative rates, which will invariably lead to a larger chaos. To get rid of these problems, a weighted-intrusion based cuckoo search (WI-CS) and graded neural network (GNN) methods are proposed in this chapter. The key purpose of this chapter is to identify and categorize the anomalies in a SCADA system through data optimization. At initial stage, the collected real-time SCADA dataset is given as input. Then, by using the aforementioned proposed machine learning algorithms, these data are clustered and optimized. Later to find, the type of intrusion will remain as a further challenge and for that we propose HNA-AA algorithm. The investigational results estimate the efficiency of the system by considering sensitivity, false detection rate, precision, recall, Jaccard, accuracy, dice and specificity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Aghajanzadeh N, Keshavarz-Haddad A (2015) A concise model to evaluate security of SCADA systems based on security standards. Int J Comput Appl 111

    Google Scholar 

  2. Shahzad A et al (2015) A SCADA intermediate simulation platform to enhance the system security. In: 2015 17th international conference on advanced communication technology (ICACT), pp 368–373

    Google Scholar 

  3. Debashis De et al (2020) Wireless sensor network: applications, challenges, and algorithms, Springer tracts in nature-inspired. Springer, pp 1–18

    Google Scholar 

  4. Wei H et al (2015) SOM-based intrusion detection for SCADA systems. In: Electronics and electrical engineering: proceedings of the 2014 Asia-Pacific electronics and electrical engineering conference (EEEC 2014), 27–28 Dec 2014, Shanghai, China, p 57

    Google Scholar 

  5. Mcquillan JL, Lloyd CA (2016) SCADA intrusion detection systems. ed: US Patent 20,160,094,578

    Google Scholar 

  6. Liao H-J et al (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36:16–24

    Article  Google Scholar 

  7. Das SK, Tripathi S (2019) A nonlinear strategy management approach in software-defined ad hoc network. In: Lecture notes in networks and system, pp 321–346

    Google Scholar 

  8. Manikandan ST (2014) Removal of selective black hole attack in MANET by AODV protocol. Int J Innov Res Sci Eng Technol 3(3):2372–2377

    Google Scholar 

  9. Shitharth S, Winston DP (2015) An appraisal on security challenges and countermeasures in smart grid. Int J Appl Eng Res 10(20):16591–16597

    Google Scholar 

  10. Ou C-M (2012) Host-based intrusion detection systems adapted from agent-based artificial immune systems. Neurocomputing 88:78–86

    Article  Google Scholar 

  11. Shitharth S, Winston DP (2015) A comparative analysis between two countermeasure techniques to detect DDoS with sniffers in a SCADA network. Procedia Technol 21:179–186

    Article  Google Scholar 

  12. Koc L et al (2012) A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier. Expert Syst Appl 39:13492–13500

    Article  Google Scholar 

  13. Selvarajan S, Shaik M, Ameerjohn S, Kannan S (2019) Mining of intrusion attack in SCADA network using clustering and genetically seeded flora based optimal classification algorithm. Inf Secur IET 14(1):1–11

    Article  Google Scholar 

  14. Almalawi A et al (2016) An efficient data-driven clustering technique to detect attacks in SCADA systems. IEEE Trans Inf Foren Secur 11:893–906

    Article  Google Scholar 

  15. Mitchell R, Chen R (2016) Modeling and analysis of attacks and counter defense mechanisms for cyber physical systems. IEEE Trans Reliab 65:350–358

    Article  Google Scholar 

  16. Ponomarev S, Atkison T (2016) Industrial control system network intrusion detection by telemetry analysis. IEEE Trans Dependable Secur Comput 13:252–260

    Article  Google Scholar 

  17. Lin H et al (2016) Runtime semantic security analysis to detect and mitigate control-related attacks in power grids. IEEE Trans Smart Grid 1–1

    Google Scholar 

  18. Liu AX, Torng E (2016) Overlay automata and algorithms for fast and scalable regular expression matching. IEEE/ACM Trans Netw 1–16

    Google Scholar 

  19. Marchang N et al (2016) A Novel approach for efficient usage of intrusion detection system in mobile Ad Hoc networks. IEEE Trans Veh Technol 1–1

    Google Scholar 

  20. Li B et al (2016) DDOA: a dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system. IEEE Trans Inf Foren Secur 1–1

    Google Scholar 

  21. Ambusaidi M et al (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput 1–13

    Google Scholar 

  22. Hasan MM, Mouftah HT (2016) Optimal trust system placement in smart grid SCADA networks. IEEE Access 4:2907–2919

    Article  Google Scholar 

  23. Yang Y et al (2014) Multiattribute SCADA-specific intrusion detection system for power networks. IEEE Trans Power Delivery 29:1092–1102

    Article  Google Scholar 

  24. Samdarshi R et al (2015) A triple layer intrusion detection system for SCADA security of electric utility. In: 2015 annual IEEE India conference (INDICON), pp 1–5

    Google Scholar 

  25. Sayegh N et al (2014) SCADA intrusion detection system based on temporal behavior of frequent patterns. In: MELECON 2014–2014 17th IEEE mediterranean electrotechnical conference, pp 432–438

    Google Scholar 

  26. Amin S et al (2013) Cyber security of water SCADA systems—part II: attack detection using enhanced hydrodynamic models. IEEE Trans Control Syst Technol 21:1679–1693

    Article  Google Scholar 

  27. Maglaras LA et al (2014) Integrated OCSVM mechanism for intrusion detection in SCADA systems. Electron Lett 50:1935–1936

    Article  Google Scholar 

  28. Yang Y et al (2013) Intrusion detection system for IEC 60870–5–104 based SCADA networks. In: 2013 IEEE Power Energy Soc Gener Meet: 1–5

    Google Scholar 

  29. Yasakethu S, Jiang J (2013) Intrusion detection via machine learning for SCADA system protection. In: Proceedings of the 1st international symposium on ICS and SCADA cyber security research 2013, pp 101–105

    Google Scholar 

  30. Wang Y et al (2014) SRID: state relation based intrusion detection for false data injection attacks in SCADA. In: European symposium on research in computer security, pp 401–418

    Google Scholar 

  31. Goldenberg N, Wool A (2013) Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. Int J Crit Infrastruct Prot 6:63–75

    Article  Google Scholar 

  32. Almalawi A et al (2014) An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. Comput Secur 46:94–110

    Article  Google Scholar 

  33. Ahmed M et al (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19–31

    Article  Google Scholar 

  34. Das SK, Tripathi S (2018) Intelligent energy-aware efficient routing for MANET. Wirel Netw 24(4):1139–1159

    Article  Google Scholar 

  35. De D, Mukherjee A, Das SK, Dey N (2020) Nature-inspired computing for wireless sensor networks, Springer tracts in nature-inspired. Springer, pp 1–341

    Google Scholar 

  36. Suthaharan S et al (2010) Labelled data collection for anomaly detection in wireless sensor networks. In: Intelligent sensors, sensor networks and information processing (ISSNIP), 2010 6th international conference on, pp 269–274

    Google Scholar 

  37. Selvarajan S, Shaik M, Ameerjohn S, Kannan S (2019) Integrated probability relevancy classification (IPRC) for IDS in SCADA’, design framework for wireless network. Lect Notes Netw Syst 82(1):41–64

    Google Scholar 

  38. Das SK, Samanta S, Dey N, Kumar R (2019) Design frameworks for wireless networks. Lecture notes in networks and system. Springer, Singapore, pp 1–439

    Google Scholar 

  39. Dey N et al (2017) Develo** residential wireless sensor networks for ECG healthcare monitoring. IEEE Trans Consum Electron 63(4):442–449

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Shitharth, S., Satheesh, N., Kumar, B.P., Sangeetha, K. (2021). IDS Detection Based on Optimization Based on WI-CS and GNN Algorithm in SCADA Network. In: Das, S.K., Samanta, S., Dey, N., Patel, B.S., Hassanien, A.E. (eds) Architectural Wireless Networks Solutions and Security Issues. Lecture Notes in Networks and Systems, vol 196. Springer, Singapore. https://doi.org/10.1007/978-981-16-0386-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-0386-0_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-0385-3

  • Online ISBN: 978-981-16-0386-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation