Skip to main content
Log in

Benford’s Law in the Detection of DoS Attacks on Industrial Systems

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

Benford’s law describes the distribution of the first significant digits in numerical data characterizing real processes. In particular, it is widely used to detect anomalies in financial data. The paper proposes application of Benford’s law to detect DoS attacks on large-scale industrial system components. The results of experimental research are given for the data generated by sensors within the Tennessee Eastman process.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.
Fig. 8.
Fig. 9.

Similar content being viewed by others

REFERENCES

  1. Zegzhda, D.P., Vasil’ev, Yu.S., Poltavtseva, M.A., Kefeli, I.F., and Borovkov, A.I., Cybersecurity of progressive production technologies in the era of digital transofrmation, Vopr. Kiberbezop., 2018, no. 2, pp. 2–15.

  2. Vasil’ev, Yu.S., Zegzhda, D.P., and Poltavtseva, M.A., Problems of security in digital production and its resistance to cyber threats, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1090–1100.

    Article  Google Scholar 

  3. Industroyer: Biggest malware threat to critical infrastructure since Stuxnet. https://www.eset.com/int/industroyer/. Accessed January 28, 2019.

  4. The New Threat: IoT DDoS Invasion. https://www.a10networks.com/resources/infographics/new-threat-iot-ddos-invasion. Accessed January 28, 2019.

  5. Downs, J.J. and Vogel, E.F., A plant-wide industrial process control problem, Comput. Chem. Eng., 1993, vol. 17, no. 3, pp. 245–255.

    Article  Google Scholar 

  6. Filonov, P., Kitashov, F., and Lavrentyev, A., RNN-based early cyber-attack detection for the Tennessee Eastman process, arXiv preprint arXiv:1709.02232, 2017.

  7. Benford, F., The law of anomalous numbers, Proc. Am. Philos. Soc., 1938, vol. 78, no. 4, pp. 551–572.

    MATH  Google Scholar 

  8. Hill, T.P., et al., A statistical derivation of the significant-digit law, Stat. Sci., 1995, vol. 10, no. 4, pp. 354–363.

    Article  MathSciNet  Google Scholar 

  9. Benford Online Bibliography. http://www.benfordonline.net/list/chronological/. Accessed January 30, 2019.

  10. Nigrini, M.J., Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations, John Wiley & Sons, 2011.

    Book  Google Scholar 

  11. Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912–917.

    Article  Google Scholar 

  12. Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of internet backbone traffic for detecting denial of service attacks, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 2, pp. 48–58.

  13. Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of internet backbone traffic for detecting denial of service attacks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 936–944.

    Article  Google Scholar 

  14. Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Probl. Inf. Bezop., Komp’yut. Sist., 2017, no. 3, p. 9–22.

  15. Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 805–816.

    Article  Google Scholar 

Download references

Funding

The research was carried out as part of a grant from the President of the Russian Federation for state support of the leading scientific schools of the Russian Federation no. NSh-2992.2018.9 (agreement 075-15-2019-1066).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. B. Aleksandrova.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by A. Kolemesin

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aleksandrova, E.B., Lavrova, D.S. & Yarmak, A.V. Benford’s Law in the Detection of DoS Attacks on Industrial Systems. Aut. Control Comp. Sci. 53, 954–962 (2019). https://doi.org/10.3103/S0146411619080030

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411619080030

Keywords:

Navigation