Abstract
Supervisory control and data acquisition (SCADA) stands as a control system consisting of computers and networked data communications. At present, many industries use SCADA to monitor as well as control the processes. In recent days, numerous attacks are targeting these systems. Thus, the furtherance of high-security SCADA is much-needed one on account of its susceptibility to attacks centered on the architectural restriction. To identify these attacks, numerous classifications, optimization methods, and intrusion detecting systems (IDS) are posited. The chief drawbacks of this prevailing work are detecting accuracy, high training time, and security. For prevailing over these disadvantages, an NK-RNN classifier is proposed to recognize the intrusions in the SCADA method. Initially, the features from the datasets are organized, and the important attributes are chosen by utilizing the Elephant Herding Optimization (EHO). Secondly, the data, which is optimized, are grouped and classified by applying the NK-RNN classifier. Then, the outcomes, which are classified, are assessed and utilized to outcome prediction. In normal data, Caesar Ciphering is employed for the prevention of attacks and also the modified elliptic curve cryptography is employed for enhancing the security level. From the performance assessment, it is revealed that the NK-RNN method attains superior performance than the prevailing classification method along with IDS algorithms.










Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Availability of data and materials
Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.
References
Abusafat F, Pereira T, Santos H (2018) Proposing a behavior-based IDS model for IoT environment. In: International Journal of European symposium on systems analysis and design. Springer, Cham, pp 114–134
Almalawi A, Fahad A, Tari Z, Alamri A, AlGhamdi R, Zomaya AY (2015) An efficient data-driven clustering technique to detect attacks in SCADA systems. IEEE Trans Inf Forensics Secur 11(5):893–906
Ambusaidi MA, He X, Nanda P, Tan Z (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput 65(10):2986–2998
Amin S, Litrico X, Sastry SS, Bayen AM (2012) Cyber security of water SCADA systems—part II attack detection using enhanced hydrodynamic models. IEEE Trans Control Syst Technol 21(5):1679–1693
Cherdantseva Y, Burnap P, Blyth A, Eden P, Jones K, Soulsby H, Stoddart K (2016) A review of cyber security risk assessment methods for SCADA systems. Comput Secur 56:1–27
Enescu FM, Bizon N (2017) SCADA applications for electric power system. Reactive power control in AC power systems, 1st edn. Springer, Cham, pp 561–609
Finogeev AG, Finogeev AA (2017) Information attacks and security in wireless sensor networks of industrial SCADA systems. J Ind Inf Integr 5:6–16
Ghosh S, Sampalli S (2019) A survey of security in SCADA networks current issues and future challenges. IEEE Access 7:135812–135831
Goldenberg N, Wool A (2013) Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. Int J Crit Infrastruct Prot 6(2):63–75
Hassan WH (2019) Current research on Internet of Things (IoT) security: a survey. Comput Netw 148:283–294
Hemdan EE-D, Manjaiah DH (2018) Cybercrimes investigation and intrusion detection in internet of things based on data science methods. In: Cognitive computing for big data systems over IoT. Springer, Cham, pp 39–62
Kalech M (2019) Cyber-attack detection in SCADA systems using temporal pattern recognition techniques. Comput Secur 84:225–238
Krishnan Sadhasivan D, Balasubramanian K (2017) A novel LWCSO-PKM-based feature optimization and classification of attack types in SCADA network. Arab J Sci Eng 42(8):3435–3449
Li W, Xie L, Deng Z, Wang Z (2016) False sequential logic attack on SCADA system and its physical impact analysis. Comput Secur 58:149–159
Lin C-Y, Nadjm-Tehrani S, Asplund M (2017) Timing-based anomaly detection in SCADA networks. In: International conference on critical information infrastructures security. Springer, Cham, pp 48–59
Lin H, Slagell A, Kalbarczyk ZT, Sauer PW, Iyer RK (2018) Runtime semantic security analysis to detect and mitigate control-related attacks in power grids. IEEE Trans Smart Grid 9(1):163–178
Lu K-D, Zeng G-Q, Luo X, Weng J, Luo W, Wu Y (2021) Evolutionary deep belief network for cyber-attack detection in industrial automation and control system. IEEE Trans Ind Inform 17(11):7618–7627
McEvoy TR, Wolthusen SD (2011) Defeating node based attacks on SCADA systems using probabilistic packet observation. In: International workshop on critical information infrastructures security. Springer, Berlin, pp 70–80
Nazir S, Patel S, Patel D (2017) Assessing and augmenting SCADA cyber security a survey of techniques. Comput Secur 70:436–454
Samdarshi R, Sinha N, Tripathi P (2015) A triple layer intrusion detection system for SCADA security of electric utility. In: Annual IEEE India conference (INDICON), 17–20 December, New Delhi, India, pp 1–5
Shahzad A, Udagepola KP, Lee Y, Park S, Lee M (2015a) The sensors connectivity within SCADA automation environment and new trends for security development during multicasting routing transmission. Int J Distrib Sens Netw. https://doi.org/10.1155/2015/738687
Shahzad A, Xiong N, Irfan M, Lee M, Hussain S, Khaltar B (2015b) A SCADA intermediate simulation platform to enhance the system security. In: 17th International conference on advanced communication technology (ICACT), 1–3 july, PyeongChang, Korea (South), pp 368–373
Shitharth S (2017) An enhanced optimization based algorithm for intrusion detection in SCADA network. Comput Secur 70:16–26
Shitharth S, Sangeetha K, Praveen Kumar B (2020) Integrated probabilistic relevancy classification (PRC) scheme for intrusion detection in SCADA network. In: Design frameworks for wireless networks. Springer, Singapore, pp 41–63
Shlomo A, Kalech M, Moskovitch R (2020) Temporal pattern-based malicious activity detection in SCADA systems. Comput Secur. https://doi.org/10.1016/j.cose.2020.102153
Upadhyay D, Sampalli S (2020) SCADA (Supervisory Control and Data Acquisition) systems vulnerability assessment and security recommendations. Comput Secur 89:101666
Yang Y, McLaughlin K, Sezer S, Littler T, Im EG, Pranggono B, Wang HF (2014) Multiattribute SCADA-specific intrusion detection system for power networks. IEEE Trans Power Deliv 29(3):1092–1102
Yılmaz EN, Gönen S (2018) Attack detection/prevention system against cyber attack in industrial control systems. Comput Secur 77:94–105
Acknowledgements
We thank the anonymous referees for their useful suggestions.
Funding
This work has no funding resource.
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Mr. YJ, Dr. PJ. The first draft of the manuscript was written by Mr. YJ and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Consent of publication
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Justindhas, Y., Jeyanthi, P. Attack detection and prevention in IoT-SCADA networks using NK-classifier. Soft Comput 26, 6811–6823 (2022). https://doi.org/10.1007/s00500-022-06921-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-022-06921-3