Log in

Development of Intrusion Detection in Industrial Control Systems Based On Deep Learning

  • Review Paper
  • Published:
Iranian Journal of Science and Technology, Transactions of Electrical Engineering Aims and scope Submit manuscript

Abstract

Industrial control systems (ICSs) are essential and inseparable part of industrial infrastructures. Industrial control systems have long been designed and established isolated from the outside world; however, due to the needs for development and performance improvement, these industrial systems have been connected to other organization networks. Since security requirements and predictions have not been considered, ICSs are faced with new security threats. Therefore, cybersecurity in industrial control systems is of utmost importance due to severe economic, environmental, human and political consequences. Hence, the design of intrusion detection systems based on industrial control systems is also essential. In the present study, an accurate ICS scheme is developed based on the capabilities of deep neural networks (DNNs). In the proposed scheme, we try to detect the spatial space of packets exclusively by employing convolutional networks. Passing through the long short-term memory (LSTM) network, the time dependence between packets is used to diagnose abnormalities and attacks. Show that the proposed intrusion detection system outperforms other existing industrial intrusion detection systems in terms of accuracy. The high ability of the proposed scheme in dealing with unbalanced data sets is another exciting feature of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Al-Abassi A, Karimipour H, Dehghantanha A, Parizi R (2020) An ensemble deep learning-based cyber-attack detection in industrial control system. IEEE Access 8:83965–83973

    Article  Google Scholar 

  • Altenberger F, Lenz C (2018) A non-technical survey on deep convolutional neural network architectures. Retrieved from http://arxiv.org/abs/1803.02129

  • Berman D, Buczak A, Chavis J, Corbett C (2019) A survey of deep learning methods for cyber security. Information (basel) 10(4):122

    Article  Google Scholar 

  • Boutaba R, Salahuddin M, Limam N, Ayoubi S, Shahriar N, Estrada-Solano F, Caicedo O (2018) A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. J Internet Serv Appl 9(1):1–99. https://doi.org/10.1186/s13174-018-0087-2

    Article  Google Scholar 

  • Chalapathy R, Chawla S (2019) Deep learning for anomaly detection: a survey. Retrieved from http://arxiv.org/abs/1901.03407

  • Chang C, Hsu W, Liao I (2019) Anomaly detection for industrial control systems using k-means and convolutional autoencoder. In 2019 International conference on software, telecommunications and computer networks (SoftCOM), IEEE, (pp. 1–6)

  • Choi S, Yun J, Kim S (2019) A comparison of ICS datasets for security research based on attack paths. Critical Information Infrastructures Security. Springer International Publishing, Cham, pp 154–166

    Chapter  Google Scholar 

  • Ding D, Han Q, **angY GX, Zhang X (2018) A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275:1674–1683

    Article  Google Scholar 

  • Feng C, Li T, Chana D (2017) Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks. In: 2017 47th Annual IEEE/IFIP international conference on dependable systems and networks (DSN). IEEE

  • Gao J, Gan L, Buschendorf F, Zhang L, Liu H, Li P, Lu T (2020) Omni SCADA intrusion detection using deep learning algorithms. IEEE Internet Things J 8(2):951–61

    Article  Google Scholar 

  • Greer B (2018) ICS/SCADA security issues of interdependencies and unsecure protocols. https://doi.org/10.13140/RG.2.2.28413.46567

  • Hodo E, Bellekens X, Hamilton A, Tachtatzis C, Atkinson R (2017) Shallow and deep networks intrusion detection system: a taxonomy and survey. Retrieved from http://arxiv.org/abs/1701.02145

  • Hu Y, Yang A, Li H, Sun Y, Sun L (2018) A survey of intrusion detection on industrial control systems. Int J Distrib Sens Netw 14(8):155014771879461

    Article  Google Scholar 

  • Huda S, Yearwood J, Hassan M, Almogren A (2018) Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks. Appl Soft Comput 71:66–77

    Article  Google Scholar 

  • Jadon S (2020) A survey of loss functions for semantic segmentation. In: 2020 IEEE conference on computational intelligence in bioinformatics and computational biology (CIBCB). IEEE

  • Jiang F, Fu Y, Gupta B, Liang Y, Rho S, Lou F, Tian Z (2020) Deep learning based multi-channel intelligent attack detection for data security. IEEE Trans Sustain Comput 5(2):204–212

    Article  Google Scholar 

  • Khan I, Pi D, Khan Z, Hussain Y, Nawaz A (2019) HML-IDS: A hybrid-multilevel anomaly prediction approach for intrusion detection in SCADA systems. IEEE Access 7:89507–89521

    Article  Google Scholar 

  • Lai Y, Zhang J, Liu Z (2019) Industrial anomaly detection and attack classification method based on convolutional neural network. Security Commun Netw 2019:1–11

    Article  Google Scholar 

  • Morris T, Thornton Z, Turnipseed I (2015) Industrial control system simulation and data logging for intrusion detection system research

  • Morris T, Gao W (2014) Industrial control system traffic data sets for intrusion detection research. Progress in Pattern Recognition, Image Analysis, Computer Vision and Applications. Springer International Publishing, Cham, pp 65–78

    Chapter  Google Scholar 

  • Nehinbe J. (2018) A review of technical issues on IDS and alerts. Global J Comput Sci Technol

  • Nwankpa C, Ijomah W, Gachagan A, Marshall S (2018) Activation functions: comparison of trends in practice and research for deep learning. Retrieved from http://arxiv.org/abs/1811.03378

  • Perez R, Adamsky F, Soua R, Engel T (2018) Machine learning for reliable network attack detection in SCADA systems. In 2018 17th IEEE International conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and Engineering (TrustCom/BigDataSE), IEEE, (pp. 633–638)

  • Raghavendra U, Fujita H, Bhandary S, Gudigar A, Tan JH, Acharya UR (2018) Deep convolution neural network for accurate diagnosis of glaucoma using digital fundus images. Inf Sci 441:41–49

    Article  MathSciNet  Google Scholar 

  • Rodofile N, Radke K, Foo E (2015) Real-time and interactive attacks on DNP3 critical infrastructure using Scapy.

  • Sharma S, Athaiya A (2020) Activation functions in neural networks. Int J Eng Appl Sci Technol 04(12):310–316

    Google Scholar 

  • Shewalkar A, Nyavanandi D, Ludwig SA (2019) Performance evaluation of deep neural networks applied to speech recognition: RNN, LSTM and GRU. J Artif Intell Soft Comput Res 9(4):235–245

    Article  Google Scholar 

  • Shirazi S, Gouglidis A, Syeda K N, Simpson S, Mauthe A, Stephanakis IM, Hutchison D (2016) Evaluation of anomaly detection techniques for SCADA communication resilience. 2016 Resilience Week (RWS). IEEE

  • Sokolov AN, Alabugin, SK, Pyatnitsky IA (2019) Traffic modeling by recurrent neural networks for intrusion detection in industrial control systems. In: 2019 International conference on industrial engineering, applications and manufacturing (ICIEAM). IEEE

  • Stursa D, Dolezel P (2019) Comparison of ReLU and linear saturated activation functions in neural network for universal approximation. In: 2019 22nd International conference on process control (PC19). IEEE.

  • Traore B, Kamsu-Foguem B, Tangara F (2018) Deep convolution neural network for image recognition. Eco Inform 48:257–268

    Article  Google Scholar 

  • Xu L, **ang J, Yuan X (2018) CRNet: Classification and regression neural network for facial beauty prediction. Advances in Multimedia Information Processing – PCM 2018. Springer International Publishing, Cham, pp 661–671

    Chapter  Google Scholar 

  • Xu Y, Yang Y, Li T, Ju J, Wang Q (2017) Review on cyber vulnerabilities of communication protocols in industrial control systems. In: 2017 IEEE Conference on energy internet and energy system integration (EI2). IEEE

  • Yang J, Li T, Liang G, He W, Zhao Y (2019b) A simple recurrent unit model based intrusion detection system with DCGAN. IEEE Access 7:83286–83296

    Article  Google Scholar 

  • Yang H, Cheng L, Chuah M (2019a) Deep-learning-based network intrusion detection for SCADA systems. In: 2019a IEEE Conference on Communications and Network Security (CNS). IEEE

  • Yusheng W, Kefeng F, Yingxu L, Zenghui L, Ruikang Z, **angzhen Y, Lin L (2017) Intrusion detection of industrial control system based on modbus TCP protocol. In: 2017 IEEE 13th International symposium on autonomous decentralized system (ISADS). IEEE

  • Zolanvari M, Teixeira M, Gupta L, Khan K, Jain R (2019) Machine learning-based network vulnerability analysis of industrial internet of things. IEEE Internet Things J 6(4):6822–6834

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seyed Mostafa Fakhrahmad.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Monfared, M.R., Fakhrahmad, S.M. Development of Intrusion Detection in Industrial Control Systems Based On Deep Learning. Iran J Sci Technol Trans Electr Eng 46, 641–651 (2022). https://doi.org/10.1007/s40998-022-00493-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40998-022-00493-6

Keywords

Navigation