Abstract
The current industrial control system attack detection methods are single, the detection results are fuzzy and cannot be applied to the domestic industrial environment. In response to the above problems, an industrial control system attack detection model based on Bayesian network (BN) and Timed automata (TA) theory is proposed. First, collect the real industrial purification data of the aluminum factory, that is, the sensor and actuator signals, and preprocess the signals through time compression, segmentation, and queue division; secondly, establish Timed automata and Bayesian network models respectively, using probability time automatization The computer simulates the regular behavior of the time series, and at the same time uses the Bayesian network to build the dependency relationship between the sensor and the actuator; finally, the model’s detection result of the attack data is calculated. Theoretical analysis and experimental results show that compared with Deep Neural Network (DNN) and Support Vector Machine (SVM), the model in the article has improved time and accuracy.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Wenli, S., Panfeng, A., Ming, W.: Overview of research and development of intrusion detection technology for industrial control systems. Appl. Res. Comput. 34(002), 328–333 (2017)
Yingxu, L., Zenghui, L., Xiaotian, C.: Overview of industrial control system intrusion detection research. J. Commun. 38(002), 143–156 (2017)
Yue, W., Ting, F., Minhu, M.: The evolution and enlightenment of U.S. critical infrastructure information security monitoring and early warning mechanism. Intell. Mag. 32(002), 142–155 (2016)
Morrris, T., Wei, G.: On cyber attacks and signature based intrusion detection for MODBUS based industrial control systems. J. Digit. Forensics Secur. Law. 9, 37–56 (2014)
Oman, P., Phillips, M.: Intrusion detection and event monitoring in SCADA networks. DBLP. 253, 161–173 (2007)
Zheng, X., Julien, C.: Verification and validation in cyber physical systems. In: Research Challenges and a Way Forward. IEEE (2015)
Zuliani, P.: Statistical model checking for cyberphysical systems. In: Proceedings of the International Conference on Automated Technology for Verification and Analysis (2011)
Adepu, S., Kang, E., Jackson, D., et al.: Model-based security analysis of a water treatment system. In: Proceedings of the 2nd International Workshop on Software Engineering for Smart CyberPhysical Systems (2016)
Junejo, K.N., Goh, J.: Behavior-based attack detection and classification in cyber physical systems using machine learning. In: Proceedings of the ACM International Workshop on Cyber-physical System Security (2016)
Goh, J., Adepu, S., Tan, M., et al.: Anomaly detection in cyber physical systems using recurrent neural networks. In: Proceedings of the IEEE International Symposium on High Assurance Systems Engineering (2017)
Inoue, J., Yamagata, Y., Chen, Y., et al.: Anomaly detection for a water treatment system using unsupervised machine learning. In: Proceedings of the 2017 IEEE International Conference on Data Mining Workshops (ICDMW) (2017)
Adepu, S., Mathur, A.: Generalized attacker and attack models for cyber physical systems. In: Proceedings of the Computer Software and Applications Conference (2016)
Adepu, S., Mathur, A.: Using process invariants to detect cyber attacks on a water treatment system. In: Proceedings of the 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016 (2016)
Keogh, E., Chu, S., Hart, D., et al.: An online algorithm for segmenting time series. In: Proceedings of the 2001 IEEE International Conference on Data Mining (2002)
Verwer, Ewout, S.: Lazy abstraction for timed automata: theory and practice. Electr. Eng. Math. Comput. Sci. (2013)
Herbreteau, Walukiewicz, l.: Efficient verification of timed Automata. J. Comput. Sci. 07(004), (2016)
Verwer, S., de Weerdt, M., Witteveen, C.: A likelihood-ratio test for identifying probabilistic deterministic real-time automata from positive data. In: Sempere, J.M., García, P. (eds.) Grammatical Inference: Theoretical Results and Applications, vol. 6339, pp. 203–216. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15488-1_17
Cooper, G.F., Herskovits, E.A.: Bayesian method for the induction of probabilistic networks from data. Mach. Learn. 9(4), 309–347 (1992)
Bielza Lozoya, M.C., Moral Callejón, S., Salmerón Cerdán, A.: Recent advances in probabilistic graphical models. Int. J. Intell. Syst. 30(3), 207–208 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
Fund of Education Department of Inner Mongolia Autonomous Region [NJZZ18077]
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Sun, Y., Wang, G., Yan, Pz., Zhang, Lf., Yao, X. (2022). Industrial Control System Attack Detection Model Based on Bayesian Network and Timed Automata. In: Wei, J., Zhang, LJ. (eds) Big Data – BigData 2021. BigData 2021. Lecture Notes in Computer Science(), vol 12988. Springer, Cham. https://doi.org/10.1007/978-3-030-96282-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-96282-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-96281-4
Online ISBN: 978-3-030-96282-1
eBook Packages: Computer ScienceComputer Science (R0)