skip to main content
research-article

GNN-based Advanced Feature Integration for ICS Anomaly Detection

Published:14 November 2023Publication History
Skip Abstract Section

Abstract

Recent adversaries targeting the Industrial Control Systems (ICSs) have started exploiting their sophisticated inherent contextual semantics such as the data associativity among heterogeneous field devices. In light of the subtlety rendered in these semantics, anomalies triggered by such interactions tend to be extremely covert, hence giving rise to extensive challenges in their detection. Driven by the critical demands of securing ICS processes, a Graph-Neural-Network (GNN) based method is presented to tackle these subtle hostilities by leveraging an ICS’s advanced contextual features refined from a universal perspective, rather than exclusively following GNN’s conventional local aggregation paradigm. Specifically, we design and implement the Graph Sample-and-Integrate Network (GSIN), a general chained framework performing node-level anomaly detection via advanced feature integration, which combines a node’s local awareness with the graph’s prominent global properties extracted via process-oriented pooling. The proposed GSIN is evaluated on multiple well-known datasets with different kinds of integration configurations, and results demonstrate its superiority consistently on not only anomaly detection performance (e.g., F1 score and AUPRC) but also runtime efficiency over recent representative baselines.

REFERENCES

  1. [1] Abdallah M., Khac N. An Le, Jahromi H., and Jurcut A. Delia. 2021. A hybrid CNN-LSTM based approach for anomaly detection systems in SDNs. In Proceedings of the 16th International Conference on Availability, Reliability and Security. 17.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Abedalla Loai, Badarna Murad, Khalifa Waleed, and Yousef Malik. 2019. K–means based one-class svm classifier. In Proceedings of the International Conference on Database and Expert Systems Applications. Springer, 4553.Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] AlMedires M. and AlMaiah M.. 2021. Cybersecurity in industrial control system (ICS). In Proceedings of the 2021 International Conference on Information Technology.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Asghar M. R., Hu Q., and Zeadally S.. 2019. Cybersecurity in industrial control systems: Issues, technologies, and challenges. Computer Networks 165, C (2019), 106946. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Barbosa R. R. R., Sadre R., and Pras A.. 2012. A first look into SCADA network traffic. In Proceedings of the 2012 IEEE Network Operations and Management Symposium. IEEE, 518521.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Caselli M., Zambon E., and Kargl F.. 2015. Sequence-aware intrusion detection in industrial control systems. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security. 1324.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Chen Lei, Li Yuan, Deng Xingye, Liu Zhaohua, Lv Mingyang, and Zhang Hongqiang. 2022. Dual auto-encoder GAN-based anomaly detection for industrial control system. Applied Sciences 12, 10 (2022), 4986.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Deng A. and Hooi B.. 2020. Graph neural network-based anomaly detection in multivariate time series. In Proceedings of the AAAI Conference on Artificial Intelligence. 40274035.Google ScholarGoogle Scholar
  9. [9] Deng Xiaoheng, Zhu Jincai, Pei Xinjun, Zhang Lan, Ling Zhen, and Xue Kaiping. 2022. Flow topology-based graph convolutional network for intrusion detection in label-limited IoT networks. IEEE Transactions on Network and Service Management 20, 1 (2022), 684–696. https://ieeexplore.ieee.org/document/9919790Google ScholarGoogle Scholar
  10. [10] Dey A.. 2020. Deep IDS: A deep learning approach for Intrusion detection based on IDS 2018. In Proceedings of the 2020 2nd International Conference on Sustainable Technologies for Industry 4.0. IEEE, 15.Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Dhiman H. S., Deb D., Muyeen S. M., and Kamwa I.. 2021. Wind turbine gearbox anomaly detection based on adaptive threshold and twin support vector machines. IEEE Transactions on Energy Conversion 36, 4 (2021), 34623469.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Du Jian, Zhang Shanghang, Wu Guanhang, Moura José M. F., and Kar Soummya. 2017. Topology adaptive graph convolutional networks. arXiv:1710.10370. Retrieved from https://arxiv.org/abs/1710.10370Google ScholarGoogle Scholar
  13. [13] Fährmann Daniel, Damer Naser, Kirchbuchner Florian, and Kuijper Arjan. 2022. Lightweight long short-term memory variational auto-encoder for multivariate time series anomaly detection in industrial control systems. Sensors 22, 8 (2022), 2886.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Goh Jonathan, Adepu Sridhar, Junejo Khurum Nazir, and Mathur Aditya. 2016. A dataset to support research in the design of secure water treatment systems. In Proceedings of the International Conference on Critical Information Infrastructures Security. Springer, 8899.Google ScholarGoogle Scholar
  15. [15] Goldenberg N. and Wool A.. 2013. Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. International journal of critical infrastructure protection 6, 2 (2013), 6375.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Hadžiosmanović D., Sommer R., Zambon E., and Hartel P. H.. 2014. Through the eye of the PLC: Semantic security monitoring for industrial processes. In Proceedings of the 30th Annual Computer Security Applications Conference. 126135.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Hamilton W., Ying Z., and Leskovec J.. 2017. Inductive representation learning on large graphs. Advances in Neural Information Processing Systems 30 (2017), 1025–1035.Google ScholarGoogle Scholar
  18. [18] Hawkins Simon, He Hongxing, Williams Graham, and Baxter Rohan. 2002. Outlier detection using replicator neural networks. In Proceedings of the International Conference on Data Warehousing and Knowledge Discovery. Springer, 170180.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Hu Z., Dong Y., Wang K., Chang K. W., and Sun Y.. 2020. Gpt-gnn: Generative pre-training of graph neural networks. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 18571867.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Karczmarek Paweł, Kiersztyn Adam, and Pedrycz Witold. 2020. n-ary isolation forest: An experimental comparative analysis. In Proceedings of the International Conference on Artificial Intelligence and Soft Computing. Springer, 188198.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Kipf T. N. and Welling M.. 2016. Semi-supervised classification with graph convolutional networks. arXiv:1609.02907. Retrieved from https://arxiv.org/abs/1609.02907Google ScholarGoogle Scholar
  22. [22] Liu Yezheng, Li Zhe, Zhou Chong, Jiang Yuanchun, Sun Jianshan, Wang Meng, and He Xiangnan. 2019. Generative adversarial active learning for unsupervised outlier detection. IEEE Transactions on Knowledge and Data Engineering 32, 8 (2019), 15171528.Google ScholarGoogle Scholar
  23. [23] Lo Wai Weng, Layeghy Siamak, Sarhan Mohanad, Gallagher Marcus, and Portmann Marius. 2022. E-graphsage: A graph neural network based intrusion detection system for iot. In Proceedings of the NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium. IEEE, 19.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] L(y)u S., Wang K., Zhang L., and Wang B.. 2022. Global-local integration for GNN-based anomalous device state detection in industrial control systems. Expert Systems with Applications 209 (2022), 118345. https://www.sciencedirect.com/science/article/pii/S0957417422014658?via%3DihubGoogle ScholarGoogle Scholar
  25. [25] Markman C., Wool A., and Cardenas A. A.. 2017. A new burst-DFA model for SCADA anomaly detection. In Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. 112.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Sankar A., Zhang X., and Chang K. C. C.. 2019. Meta-GNN: Metagraph neural network for semi-supervised learning in attributed heterogeneous information networks. In Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. 137144.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Shuaiyi L., Wang Kai, Zhang Liren, and Wang Bailing. 2023. Process-Oriented heterogeneous graph learning in GNN-Based ICS anomalous pattern recognition. Pattern Recognition 141 (2023), 109661. https://www.sciencedirect.com/science/article/pii/S003132032300362XGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Sinha J. and Manollas M.. 2020. Efficient deep CNN-BILSTM model for network intrusion detection. In Proceedings of the 2020 3rd International Conference on Artificial Intelligence and Pattern Recognition. 223231.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Song H. M. and H. K. Kim. 2018. Can network intrusion datasets. http://ocslab.hksecurity.net/Datasets/car-hacking-datasetGoogle ScholarGoogle Scholar
  30. [30] Tao Xiaoling, Peng Yang, Zhao Feng, Zhao Peichao, and Wang Yong. 2018. A parallel algorithm for network traffic anomaly detection based on Isolation Forest. International Journal of Distributed Sensor Networks 14, 11 (2018), 1550147718814471.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Taormina Riccardo, Galelli Stefano, Tippenhauer Nils Ole, Salomons Elad, Ostfeld Avi, Eliades Demetrios G., Aghashahi Mohsen, Sundararajan Raanju, Pourahmadi Mohsen, Banks M. Katherine, Brentan B. M., Herrera M., Rasekh Amin, Campbell Enrique, Montalvo I., Lima G., Izquierdo J., Haddad Kelsey, Gatsis Nikolaos, Taha Ahmad, Somasundaram Saravanakumar Lakshmanan, Ayala-Cabrera D., Chandy Sarin E., Campbell Bruce, Biswas Pratim, Lo Cynthia S., Manzi D., Jr E. Luvizotto,, Barker Zachary A., Giacomoni Marcio, Pasha M. Fayzul K., Shafiee M. Ehsan, Abokifa Ahmed A., Housh Mashor, Kc Bijay, and Ohar Ziv. 2018. The battle of the attack detection algorithms: Disclosing cyber attacks on water distribution networks. Journal of Water Resources Planning and Management 144, 8(2018), 04018048. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Togbe Maurras Ulbricht, Barry Mariam, Boly Aliou, Chabchoub Yousra, Chiky Raja, Montiel Jacob, and Tran Vinh-Thuy. 2020. Anomaly detection for data streams based on isolation forest using scikit-multiflow. In Proceedings of the International Conference on Computational Science and Its Applications. Springer, 1530.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Veličković P., Cucurull G., Casanova A., Romero A., Lio P., and Bengio Y.. 2017. Graph attention networks. arXiv:1710.10903. Retrieved from https://arxiv.org/abs/1710.10903Google ScholarGoogle Scholar
  34. [34] Wang Y., Zhang J., Guo S., Yin H., Li C., and Chen H.. 2021. Decoupling representation learning and classification for gnn-based anomaly detection. In Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval. 12391248.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Yang J., Zhou C., Tian Y. C., and Yang S. H.. 2019. A software-defined security approach for securing field zones in industrial control systems. IEEE Access 7 (2019), 8700287016. https://ieeexplore.ieee.org/document/8744558Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Zhang J., Gan S., Liu X., and Zhu P.. 2016. Intrusion detection in SCADA systems by traffic periodicity and telemetry analysis. In Proceedings of the 2016 IEEE Symposium on Computers and Communication. IEEE, 318325.Google ScholarGoogle Scholar

Index Terms

  1. GNN-based Advanced Feature Integration for ICS Anomaly Detection

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM Transactions on Intelligent Systems and Technology
              ACM Transactions on Intelligent Systems and Technology  Volume 14, Issue 6
              December 2023
              493 pages
              ISSN:2157-6904
              EISSN:2157-6912
              DOI:10.1145/3632517
              • Editor:
              • Huan Liu
              Issue’s Table of Contents

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 14 November 2023
              • Online AM: 5 September 2023
              • Accepted: 21 August 2023
              • Revised: 27 June 2023
              • Received: 21 November 2022
              Published in tist Volume 14, Issue 6

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
            • Article Metrics

              • Downloads (Last 12 months)342
              • Downloads (Last 6 weeks)63

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            Full Text

            View this article in Full Text.

            View Full Text