2015
DOI: 10.1002/sec.1398
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection algorithm based on OCSVM in industrial control system

Abstract: In order to detect abnormal communication behaviors efficiently in today's industrial control system, a new intrusion detection algorithm based on One-Class Support Vector Machine (OCSVM) is proposed in this paper. In this algorithm, a normal communication behavior model is established by using OCSVM, and the Particle Swarm Optimization algorithm is designed to optimize OCSVM model parameters. Furthermore, we adopt the normal Modbus function code sequence to train OCSVM model, and then use this model to detect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0
4

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4

Relationship

3
5

Authors

Journals

citations
Cited by 54 publications
(31 citation statements)
references
References 24 publications
(28 reference statements)
0
27
0
4
Order By: Relevance
“…Furthermore, the normal models or profiles are built from multivariate training data, and the corresponding anomaly detection is realized by using the mechanism of classification or optimization. Actually, the computational intelligence techniques have been attracting great interests of both industry and academia, and many computational intelligence approaches have been researched, mainly including SVM (Support Vector Method) [15,24,25], neural network [26], decision trees [27], genetic algorithm [27,28], and clustering technique [29]. Although the computational intelligence-based techniques have the relatively high computational overhead, they can achieve better performance in detection, tolerance, and generality [14].…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, the normal models or profiles are built from multivariate training data, and the corresponding anomaly detection is realized by using the mechanism of classification or optimization. Actually, the computational intelligence techniques have been attracting great interests of both industry and academia, and many computational intelligence approaches have been researched, mainly including SVM (Support Vector Method) [15,24,25], neural network [26], decision trees [27], genetic algorithm [27,28], and clustering technique [29]. Although the computational intelligence-based techniques have the relatively high computational overhead, they can achieve better performance in detection, tolerance, and generality [14].…”
Section: Related Workmentioning
confidence: 99%
“…Based on our prior work [42]- [44], this paper proposes an improving algorithm which can transform the different function code sequences under the specified time interval into the function samples with the same dimension. …”
Section: A Feature Selection and Extraction For Function Control Behmentioning
confidence: 99%
“…It is easy to see that the above algorithm has three advantages: first, the function code sequences of different lengths under the specified time interval can be mapped to the function samples with the same dimension, and these function samples facilitate the further processing; second, different with our prior work [42]- [44], the function samples not only consider the information entropy of single function code in the function code sequence, but also reflect the frequency characteristic of two neighboring function codes. So, the function samples can describe the function code sequence rationally and effectively; third, our prior work used three consecutive function codes as a short sequence, and this design may cause a large dimension number of function samples.…”
Section: Namely Each Function Code Sequencementioning
confidence: 99%
See 1 more Smart Citation
“…Moreover most of data in industrial control system belong to normal communication behavior, and fault or critical state data are rare to find. Based on these observations, during recent years a lot of Intrusion Detection Systems that are based on the One Class Support Vector Machine (OCSVM) core are proposed [4][5][6][7]. OCSVM has only one category of data and simply tries to determine if new data belongs to that category or not.…”
Section: Introductionmentioning
confidence: 99%