Privacy Preservation Intrusion Detection Technique for SCADA Systems

11/08/2017
by   Marwa Keshk, et al.
0

Supervisory Control and Data Acquisition (SCADA) systems face the absence of a protection technique that can beat different types of intrusions and protect the data from disclosure while handling this data using other applications, specifically Intrusion Detection System (IDS). The SCADA system can manage the critical infrastructure of industrial control environments. Protecting sensitive information is a difficult task to achieve in reality with the connection of physical and digital systems. Hence, privacy preservation techniques have become effective in order to protect sensitive/private information and to detect malicious activities, but they are not accurate in terms of error detection, sensitivity percentage of data disclosure. In this paper, we propose a new Privacy Preservation Intrusion Detection (PPID) technique based on the correlation coefficient and Expectation Maximisation (EM) clustering mechanisms for selecting important portions of data and recognizing intrusive events. This technique is evaluated on the power system datasets for multiclass attacks to measure its reliability for detecting suspicious activities. The experimental results outperform three techniques in the above terms, showing the efficiency and effectiveness of the proposed technique to be utilized for current SCADA systems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/06/2021

A Low-Cost Machine Learning Based Network Intrusion Detection System with Data Privacy Preservation

Network intrusion is a well-studied area of cyber security. Current mach...
research
07/13/2008

Intrusion Detection Using Cost-Sensitive Classification

Intrusion Detection is an invaluable part of computer networks defense. ...
research
11/08/2017

Probability Risk Identification Based Intrusion Detection System for SCADA Systems

. As Supervisory Control and Data Acquisition (SCADA) systems control se...
research
06/16/2018

Detecting intrusions in control systems: a rule of thumb, its justification and illustrations

Control systems are exposed to unintentional errors, deliberate intrusio...
research
04/19/2023

Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review

Globally, the external Internet is increasingly being connected to the c...
research
08/09/2021

ABBA: A quasi-deterministic Intrusion Detection System for the Internet of Things

An increasing amount of processes are becoming automated for increased e...
research
05/11/2023

The Privacy-Utility Tradeoff in Rank-Preserving Dataset Obfuscation

Dataset obfuscation refers to techniques in which random noise is added ...

Please sign up or login with your details

Forgot password? Click here to reset