TY - JOUR
T1 - Time series processing-based malicious activity detection in SCADA systems
AU - Zaslavski, Michael
AU - Kalech, Meir
N1 - Publisher Copyright:
© 2024 Elsevier B.V.
PY - 2024/12
Y1 - 2024/12
N2 - Many critical infrastructures, essential to modern life, such as oil and gas pipeline control and electricity distribution, are managed by SCADA systems. In the contemporary landscape, these systems are interconnected to the internet, rendering them vulnerable to numerous cyber-attacks. Consequently, ensuring SCADA security has become a crucial area of research. This paper focuses on detecting attacks that manipulate the timing of commands within the system, while maintaining their original order and content. To address this challenge, we propose several machine-learning-based methods. The first approach relies on Long-Short-Term Memory model, and the second utilizes Hierarchical Temporal Memory model, both renowned for their effectiveness in detecting patterns in time-series data. We rigorously evaluate our methods using a real-life SCADA system dataset and show that they outperform previous techniques designed to combat such attacks.
AB - Many critical infrastructures, essential to modern life, such as oil and gas pipeline control and electricity distribution, are managed by SCADA systems. In the contemporary landscape, these systems are interconnected to the internet, rendering them vulnerable to numerous cyber-attacks. Consequently, ensuring SCADA security has become a crucial area of research. This paper focuses on detecting attacks that manipulate the timing of commands within the system, while maintaining their original order and content. To address this challenge, we propose several machine-learning-based methods. The first approach relies on Long-Short-Term Memory model, and the second utilizes Hierarchical Temporal Memory model, both renowned for their effectiveness in detecting patterns in time-series data. We rigorously evaluate our methods using a real-life SCADA system dataset and show that they outperform previous techniques designed to combat such attacks.
KW - Anomaly detection
KW - Intrusion detection
KW - SCADA
KW - Time-series
UR - http://www.scopus.com/inward/record.url?scp=85203124291&partnerID=8YFLogxK
U2 - 10.1016/j.iot.2024.101355
DO - 10.1016/j.iot.2024.101355
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:85203124291
SN - 2542-6605
VL - 28
JO - Internet of Things (Netherlands)
JF - Internet of Things (Netherlands)
M1 - 101355
ER -