Abstract
Benford’s law describes the distribution of the first significant digits in numerical data characterizing real processes. In particular, it is widely used to detect anomalies in financial data. The paper proposes application of Benford’s law to detect DoS attacks on large-scale industrial system components. The results of experimental research are given for the data generated by sensors within the Tennessee Eastman process.
Similar content being viewed by others
REFERENCES
Zegzhda, D.P., Vasil’ev, Yu.S., Poltavtseva, M.A., Kefeli, I.F., and Borovkov, A.I., Cybersecurity of progressive production technologies in the era of digital transofrmation, Vopr. Kiberbezop., 2018, no. 2, pp. 2–15.
Vasil’ev, Yu.S., Zegzhda, D.P., and Poltavtseva, M.A., Problems of security in digital production and its resistance to cyber threats, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1090–1100.
Industroyer: Biggest malware threat to critical infrastructure since Stuxnet. https://www.eset.com/int/industroyer/. Accessed January 28, 2019.
The New Threat: IoT DDoS Invasion. https://www.a10networks.com/resources/infographics/new-threat-iot-ddos-invasion. Accessed January 28, 2019.
Downs, J.J. and Vogel, E.F., A plant-wide industrial process control problem, Comput. Chem. Eng., 1993, vol. 17, no. 3, pp. 245–255.
Filonov, P., Kitashov, F., and Lavrentyev, A., RNN-based early cyber-attack detection for the Tennessee Eastman process, arXiv preprint arXiv:1709.02232, 2017.
Benford, F., The law of anomalous numbers, Proc. Am. Philos. Soc., 1938, vol. 78, no. 4, pp. 551–572.
Hill, T.P., et al., A statistical derivation of the significant-digit law, Stat. Sci., 1995, vol. 10, no. 4, pp. 354–363.
Benford Online Bibliography. http://www.benfordonline.net/list/chronological/. Accessed January 30, 2019.
Nigrini, M.J., Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations, John Wiley & Sons, 2011.
Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912–917.
Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of internet backbone traffic for detecting denial of service attacks, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 2, pp. 48–58.
Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of internet backbone traffic for detecting denial of service attacks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 936–944.
Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Probl. Inf. Bezop., Komp’yut. Sist., 2017, no. 3, p. 9–22.
Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 805–816.
Funding
The research was carried out as part of a grant from the President of the Russian Federation for state support of the leading scientific schools of the Russian Federation no. NSh-2992.2018.9 (agreement 075-15-2019-1066).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by A. Kolemesin
About this article
Cite this article
Aleksandrova, E.B., Lavrova, D.S. & Yarmak, A.V. Benford’s Law in the Detection of DoS Attacks on Industrial Systems. Aut. Control Comp. Sci. 53, 954–962 (2019). https://doi.org/10.3103/S0146411619080030
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411619080030