Time series processing-based malicious activity detection in SCADA systems

Michael Zaslavski, Meir Kalech

Research output: Contribution to journalArticlepeer-review

Abstract

Many critical infrastructures, essential to modern life, such as oil and gas pipeline control and electricity distribution, are managed by SCADA systems. In the contemporary landscape, these systems are interconnected to the internet, rendering them vulnerable to numerous cyber-attacks. Consequently, ensuring SCADA security has become a crucial area of research. This paper focuses on detecting attacks that manipulate the timing of commands within the system, while maintaining their original order and content. To address this challenge, we propose several machine-learning-based methods. The first approach relies on Long-Short-Term Memory model, and the second utilizes Hierarchical Temporal Memory model, both renowned for their effectiveness in detecting patterns in time-series data. We rigorously evaluate our methods using a real-life SCADA system dataset and show that they outperform previous techniques designed to combat such attacks.

Original languageEnglish
Article number101355
JournalInternet of Things (Netherlands)
Volume28
DOIs
StatePublished - Dec 2024
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2024 Elsevier B.V.

Keywords

  • Anomaly detection
  • Intrusion detection
  • SCADA
  • Time-series

Fingerprint

Dive into the research topics of 'Time series processing-based malicious activity detection in SCADA systems'. Together they form a unique fingerprint.

Cite this