Skip to main content

Industrial Control System Attack Detection Model Based on Bayesian Network and Timed Automata

  • Conference paper
  • First Online:
Big Data – BigData 2021 (BigData 2021)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12988))

Included in the following conference series:

  • 875 Accesses

Abstract

The current industrial control system attack detection methods are single, the detection results are fuzzy and cannot be applied to the domestic industrial environment. In response to the above problems, an industrial control system attack detection model based on Bayesian network (BN) and Timed automata (TA) theory is proposed. First, collect the real industrial purification data of the aluminum factory, that is, the sensor and actuator signals, and preprocess the signals through time compression, segmentation, and queue division; secondly, establish Timed automata and Bayesian network models respectively, using probability time automatization The computer simulates the regular behavior of the time series, and at the same time uses the Bayesian network to build the dependency relationship between the sensor and the actuator; finally, the model’s detection result of the attack data is calculated. Theoretical analysis and experimental results show that compared with Deep Neural Network (DNN) and Support Vector Machine (SVM), the model in the article has improved time and accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wenli, S., Panfeng, A., Ming, W.: Overview of research and development of intrusion detection technology for industrial control systems. Appl. Res. Comput. 34(002), 328–333 (2017)

    Google Scholar 

  2. Yingxu, L., Zenghui, L., Xiaotian, C.: Overview of industrial control system intrusion detection research. J. Commun. 38(002), 143–156 (2017)

    Google Scholar 

  3. Yue, W., Ting, F., Minhu, M.: The evolution and enlightenment of U.S. critical infrastructure information security monitoring and early warning mechanism. Intell. Mag. 32(002), 142–155 (2016)

    Google Scholar 

  4. Morrris, T., Wei, G.: On cyber attacks and signature based intrusion detection for MODBUS based industrial control systems. J. Digit. Forensics Secur. Law. 9, 37–56 (2014)

    Google Scholar 

  5. Oman, P., Phillips, M.: Intrusion detection and event monitoring in SCADA networks. DBLP. 253, 161–173 (2007)

    Google Scholar 

  6. Zheng, X., Julien, C.: Verification and validation in cyber physical systems. In: Research Challenges and a Way Forward. IEEE (2015)

    Google Scholar 

  7. Zuliani, P.: Statistical model checking for cyberphysical systems. In: Proceedings of the International Conference on Automated Technology for Verification and Analysis (2011)

    Google Scholar 

  8. Adepu, S., Kang, E., Jackson, D., et al.: Model-based security analysis of a water treatment system. In: Proceedings of the 2nd International Workshop on Software Engineering for Smart CyberPhysical Systems (2016)

    Google Scholar 

  9. Junejo, K.N., Goh, J.: Behavior-based attack detection and classification in cyber physical systems using machine learning. In: Proceedings of the ACM International Workshop on Cyber-physical System Security (2016)

    Google Scholar 

  10. Goh, J., Adepu, S., Tan, M., et al.: Anomaly detection in cyber physical systems using recurrent neural networks. In: Proceedings of the IEEE International Symposium on High Assurance Systems Engineering (2017)

    Google Scholar 

  11. Inoue, J., Yamagata, Y., Chen, Y., et al.: Anomaly detection for a water treatment system using unsupervised machine learning. In: Proceedings of the 2017 IEEE International Conference on Data Mining Workshops (ICDMW) (2017)

    Google Scholar 

  12. Adepu, S., Mathur, A.: Generalized attacker and attack models for cyber physical systems. In: Proceedings of the Computer Software and Applications Conference (2016)

    Google Scholar 

  13. Adepu, S., Mathur, A.: Using process invariants to detect cyber attacks on a water treatment system. In: Proceedings of the 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016 (2016)

    Google Scholar 

  14. Keogh, E., Chu, S., Hart, D., et al.: An online algorithm for segmenting time series. In: Proceedings of the 2001 IEEE International Conference on Data Mining (2002)

    Google Scholar 

  15. Verwer, Ewout, S.: Lazy abstraction for timed automata: theory and practice. Electr. Eng. Math. Comput. Sci. (2013)

    Google Scholar 

  16. Herbreteau, Walukiewicz, l.: Efficient verification of timed Automata. J. Comput. Sci. 07(004), (2016)

    Google Scholar 

  17. Verwer, S., de Weerdt, M., Witteveen, C.: A likelihood-ratio test for identifying probabilistic deterministic real-time automata from positive data. In: Sempere, J.M., García, P. (eds.) Grammatical Inference: Theoretical Results and Applications, vol. 6339, pp. 203–216. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15488-1_17

    Chapter  Google Scholar 

  18. Cooper, G.F., Herskovits, E.A.: Bayesian method for the induction of probabilistic networks from data. Mach. Learn. 9(4), 309–347 (1992)

    MATH  Google Scholar 

  19. Bielza Lozoya, M.C., Moral Callejón, S., Salmerón Cerdán, A.: Recent advances in probabilistic graphical models. Int. J. Intell. Syst. 30(3), 207–208 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gang Wang .

Editor information

Editors and Affiliations

Ethics declarations

Fund of Education Department of Inner Mongolia Autonomous Region [NJZZ18077]

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sun, Y., Wang, G., Yan, Pz., Zhang, Lf., Yao, X. (2022). Industrial Control System Attack Detection Model Based on Bayesian Network and Timed Automata. In: Wei, J., Zhang, LJ. (eds) Big Data – BigData 2021. BigData 2021. Lecture Notes in Computer Science(), vol 12988. Springer, Cham. https://doi.org/10.1007/978-3-030-96282-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-96282-1_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-96281-4

  • Online ISBN: 978-3-030-96282-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics