Abstract
Industry control systems (ICS) are considered as one of the inevitable systems in this contemporary smart world. In that supervisory control and data acquisition (SCADA) is the centralized system that control the entire grid. When a system is considered to be a whole and sole control, obviously an uncompromised security would be the prime. By having that as a major concern, a lot of research is being done on IDS security. In spite of that it has several cons including increased fake positive and fake negative rates, which will invariably lead to a larger chaos. To get rid of these problems, a weighted-intrusion based cuckoo search (WI-CS) and graded neural network (GNN) methods are proposed in this chapter. The key purpose of this chapter is to identify and categorize the anomalies in a SCADA system through data optimization. At initial stage, the collected real-time SCADA dataset is given as input. Then, by using the aforementioned proposed machine learning algorithms, these data are clustered and optimized. Later to find, the type of intrusion will remain as a further challenge and for that we propose HNA-AA algorithm. The investigational results estimate the efficiency of the system by considering sensitivity, false detection rate, precision, recall, Jaccard, accuracy, dice and specificity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Aghajanzadeh N, Keshavarz-Haddad A (2015) A concise model to evaluate security of SCADA systems based on security standards. Int J Comput Appl 111
Shahzad A et al (2015) A SCADA intermediate simulation platform to enhance the system security. In: 2015 17th international conference on advanced communication technology (ICACT), pp 368–373
Debashis De et al (2020) Wireless sensor network: applications, challenges, and algorithms, Springer tracts in nature-inspired. Springer, pp 1–18
Wei H et al (2015) SOM-based intrusion detection for SCADA systems. In: Electronics and electrical engineering: proceedings of the 2014 Asia-Pacific electronics and electrical engineering conference (EEEC 2014), 27–28 Dec 2014, Shanghai, China, p 57
Mcquillan JL, Lloyd CA (2016) SCADA intrusion detection systems. ed: US Patent 20,160,094,578
Liao H-J et al (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36:16–24
Das SK, Tripathi S (2019) A nonlinear strategy management approach in software-defined ad hoc network. In: Lecture notes in networks and system, pp 321–346
Manikandan ST (2014) Removal of selective black hole attack in MANET by AODV protocol. Int J Innov Res Sci Eng Technol 3(3):2372–2377
Shitharth S, Winston DP (2015) An appraisal on security challenges and countermeasures in smart grid. Int J Appl Eng Res 10(20):16591–16597
Ou C-M (2012) Host-based intrusion detection systems adapted from agent-based artificial immune systems. Neurocomputing 88:78–86
Shitharth S, Winston DP (2015) A comparative analysis between two countermeasure techniques to detect DDoS with sniffers in a SCADA network. Procedia Technol 21:179–186
Koc L et al (2012) A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier. Expert Syst Appl 39:13492–13500
Selvarajan S, Shaik M, Ameerjohn S, Kannan S (2019) Mining of intrusion attack in SCADA network using clustering and genetically seeded flora based optimal classification algorithm. Inf Secur IET 14(1):1–11
Almalawi A et al (2016) An efficient data-driven clustering technique to detect attacks in SCADA systems. IEEE Trans Inf Foren Secur 11:893–906
Mitchell R, Chen R (2016) Modeling and analysis of attacks and counter defense mechanisms for cyber physical systems. IEEE Trans Reliab 65:350–358
Ponomarev S, Atkison T (2016) Industrial control system network intrusion detection by telemetry analysis. IEEE Trans Dependable Secur Comput 13:252–260
Lin H et al (2016) Runtime semantic security analysis to detect and mitigate control-related attacks in power grids. IEEE Trans Smart Grid 1–1
Liu AX, Torng E (2016) Overlay automata and algorithms for fast and scalable regular expression matching. IEEE/ACM Trans Netw 1–16
Marchang N et al (2016) A Novel approach for efficient usage of intrusion detection system in mobile Ad Hoc networks. IEEE Trans Veh Technol 1–1
Li B et al (2016) DDOA: a dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system. IEEE Trans Inf Foren Secur 1–1
Ambusaidi M et al (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput 1–13
Hasan MM, Mouftah HT (2016) Optimal trust system placement in smart grid SCADA networks. IEEE Access 4:2907–2919
Yang Y et al (2014) Multiattribute SCADA-specific intrusion detection system for power networks. IEEE Trans Power Delivery 29:1092–1102
Samdarshi R et al (2015) A triple layer intrusion detection system for SCADA security of electric utility. In: 2015 annual IEEE India conference (INDICON), pp 1–5
Sayegh N et al (2014) SCADA intrusion detection system based on temporal behavior of frequent patterns. In: MELECON 2014–2014 17th IEEE mediterranean electrotechnical conference, pp 432–438
Amin S et al (2013) Cyber security of water SCADA systems—part II: attack detection using enhanced hydrodynamic models. IEEE Trans Control Syst Technol 21:1679–1693
Maglaras LA et al (2014) Integrated OCSVM mechanism for intrusion detection in SCADA systems. Electron Lett 50:1935–1936
Yang Y et al (2013) Intrusion detection system for IEC 60870–5–104 based SCADA networks. In: 2013 IEEE Power Energy Soc Gener Meet: 1–5
Yasakethu S, Jiang J (2013) Intrusion detection via machine learning for SCADA system protection. In: Proceedings of the 1st international symposium on ICS and SCADA cyber security research 2013, pp 101–105
Wang Y et al (2014) SRID: state relation based intrusion detection for false data injection attacks in SCADA. In: European symposium on research in computer security, pp 401–418
Goldenberg N, Wool A (2013) Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. Int J Crit Infrastruct Prot 6:63–75
Almalawi A et al (2014) An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. Comput Secur 46:94–110
Ahmed M et al (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19–31
Das SK, Tripathi S (2018) Intelligent energy-aware efficient routing for MANET. Wirel Netw 24(4):1139–1159
De D, Mukherjee A, Das SK, Dey N (2020) Nature-inspired computing for wireless sensor networks, Springer tracts in nature-inspired. Springer, pp 1–341
Suthaharan S et al (2010) Labelled data collection for anomaly detection in wireless sensor networks. In: Intelligent sensors, sensor networks and information processing (ISSNIP), 2010 6th international conference on, pp 269–274
Selvarajan S, Shaik M, Ameerjohn S, Kannan S (2019) Integrated probability relevancy classification (IPRC) for IDS in SCADA’, design framework for wireless network. Lect Notes Netw Syst 82(1):41–64
Das SK, Samanta S, Dey N, Kumar R (2019) Design frameworks for wireless networks. Lecture notes in networks and system. Springer, Singapore, pp 1–439
Dey N et al (2017) Develo** residential wireless sensor networks for ECG healthcare monitoring. IEEE Trans Consum Electron 63(4):442–449
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Shitharth, S., Satheesh, N., Kumar, B.P., Sangeetha, K. (2021). IDS Detection Based on Optimization Based on WI-CS and GNN Algorithm in SCADA Network. In: Das, S.K., Samanta, S., Dey, N., Patel, B.S., Hassanien, A.E. (eds) Architectural Wireless Networks Solutions and Security Issues. Lecture Notes in Networks and Systems, vol 196. Springer, Singapore. https://doi.org/10.1007/978-981-16-0386-0_14
Download citation
DOI: https://doi.org/10.1007/978-981-16-0386-0_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0385-3
Online ISBN: 978-981-16-0386-0
eBook Packages: EngineeringEngineering (R0)