Browse > Article
http://dx.doi.org/10.7472/jksii.2022.23.6.97

AI-based Cybersecurity Solution for Industrial Control System  

Jo, Bu-Seong (Dept. of Computer Science and Engineering, Sejong University)
Kim, Mun-Suk (Dept. of Computer Science and Engineering, Sejong University)
Publication Information
Journal of Internet Computing and Services / v.23, no.6, 2022 , pp. 97-105 More about this Journal
Abstract
This paper explains trends in security technologies for ICS. Since ICS is usually applied to large-scale national main infrastructures and industry fields, minor errors caused by cyberattack could generate enormous economic cost. ICS has different characteristic with commonly used IT systems, so considering security threats of ICS separately with IT is needed for developing modern security technology. This paper introduce framework for ICS that analyzes recent cyberattack tactics & techniques and find out trends in Intrusion Detection System (IDS) which is representative technology for ICS security, and analyzes AI technologies used for IDS. Specifically, this paper explains data collection and analysis for applying AI techniques, AI models, techniques for evaluating AI Model.
Keywords
ICS; AI; IDS; Data Collection; Model Evaluation;
Citations & Related Records
Times Cited By KSCI : 11  (Citation Analysis)
연도 인용수 순위
1 Chang-Hwan Lee, "Calculating Attribute Weights in K-Nearest Neighbor Algorithms using Information Theory", Journal of KIISE: Software and Applications, vol.32, Issue 9, 920-926, 2005.
2 Gardiner J., Craggs B., Green B., Rashid A., "Oops I Did it Again: Further Adventures in the Land of ICS Security Testbeds", the ACM Workshop, 2019. https://doi.org/10.1145/3338499.3357355   DOI
3 https://attack.mitre.org/software/S0603
4 Chao W., Bailing W., Yunxiao S., Yuliang W., Kai W., Hui Z., Hngri L., "Intrusion Detection for Industrial Control Systems Based on Open Set Artificial Neural Network", Security and Communication Networks, 2021. https://doi.org/10.1155/2021/4027900   DOI
5 Akashdeep S.,Ishfaq. M., Neeraj K., "A feature reduced intrusion detection system using ANN classifier", Expert Systems with Applications, 2017. https://doi.org/10.1016/j.eswa.2017.07.005   DOI
6 R. Vinayakumar, Mamoun A., K. P. Soman, Prabaharan P., Ameer A. N, "Deep Learning Approach for Intelligent Intrusion Detection System", IEEE Access, 2019. https://doi.org/10.1109/access.2019.2895334   DOI
7 Won-Suk Choi, Kyung-Ho Joo, Hyo-Jin Jo, Moon-Chan Park, Dong-Hoon Lee, "VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System", IEEE Transactions on Information Forensics and Security, 2018. https://doi.org/10.1109/tifs.2018.2812149   DOI
8 Ondrej P., Petr B., Karel K., Radek F., Jiri M, "Application Perspective on CyberSecurity Testbed for Industrial Control Systems", Sensors, 2021. https://doi.org/10.3390/s21238119   DOI
9 Nitesh V. C., Kevin W. B., Lawrence O. H., W. Philip. K., "SMOTE: Synthetic Minority Over-sampling Technique", Journal of Artificial Intelligence Research, 2002. https://doi.org/10.1613/jair.953   DOI
10 Jae-Hyun Seo, "A Comparative Study on the Classification of the Imbalanced Intrusion Detection Dataset Based on Deep Learning", Korean Institute of Intelligent Systems, vol.28, Issue 2, 152-159, 2018. https://doi.org/10.5391/jkiis.2018.28.2.152   DOI
11 https://developer.ibm.com/articles/cc-machine-learningdeep-learning-architectures
12 Sohrab M., Alireza A., Kang K. Y., Arman S., "A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data", Electronics, 2021. https://doi.org/10.3390/electronics10040407   DOI
13 Aloqaily M., Otoum S., Al Ridhawi I., Jararweh Y., "An intrusion detection system for connected vehicles in smart cities", Ad Hoc Networks, 2019. https://doi.org/10.1016/j.adhoc.2019.02.001   DOI
14 Mete O., Inaki E.,Fatos T. Y. V., Sanjeev R. U., H. Vincent P, "Machine learning methods for attack detection in the smart grid", IEEE Transactions on Neural Networks and Learning Systems, 2015. https://doi.org/10.1109/tnnls.2015.2404803   DOI
15 https://spritz.math.unipd.it/projects/ics_survey
16 Maede Z., Marcio A. T., Raj J., "Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning", IEEE International Conference on Itelligence and Security Informatics, 2018. https://doi.org/10.1109/isi.2018.8587389   DOI
17 https://www.ibm.com/cloud/learn/neural-networks
18 Marzban C., "The ROC Curve and the Area under It as Performance Measures", Weather and Forecasting, 2004. https://doi.org/10.1175/825.1   DOI
19 Guangzhen Z., Cuixiao Z., Lijuan Z., "Intrusion Detection using Deep Belief Network and Probabilistic Neural Network", IEEE International Conference on Computational Science and Engineering, 2017. https://doi.org/10.1109/cse-euc.2017.119   DOI
20 Ansam K., Iqbal G., Peter V., Joarder K., "Survey of intrusion detection systems: techniques, datasets and challenges", Cybersecurity, 2019. https://doi.org/10.1186/s42400-019-0038-7   DOI
21 Pil-Sung Jang, "의사결정트리 기반 혁신기업 특성 분석", Korea Technology Innovaton Society, 2019.
22 Rao F. A., Amagd M.,Ebrahim A. A. G., Ammar A. A, "Survey on Cyber Security for Industrial Control Systems", International Conference on Data Analytics for Business and Industry, 2021. https://doi.org/10.1109/ICDABI53623.2021.9655902   DOI
23 https://www.ibm.com/cloud/learn/supervised-learning
24 Shaharyar K., Alberto V., Geet K., Jonathan E., Tommaso P., Sabino C., Micheal S., "Cyber Range for Industrial Control Systems (CR-ICS) for Simulating Attack Scenarios", Italian Conference on Cybersecurity, 2021.
25 Dong-Gue Park, Deok-Jo Jeon, "A Model of Monitoring for Security of Industrial Control System", Journal of Korean Institute of Information Technology, vol.13, Issue 7, 1-16, 2015. http://doi.org/10.14801/jkiit.2015.13.7.1   DOI
26 Hyun-Seok Kim, Dong-Gue Park, "Implementation of abnormal behavior detection system based packet analysis for industrial control system security", Journal of the Korea Academia-Industrial cooperation Society, Vol. 19, Issue 4, 47-56, 2018. https://doi.org/10.5762/KAIS.2018.19.4.47   DOI
27 https://www.epnc.co.kr/news/articleView.html?idxno=92835
28 Mauro C., Denis D., Federico T., "A Survey on Industrial Control System Testbeds and Datasets for Security Research", IEEE Communications Surveys& Tutorials, 2021. https://doi.org/10.1109/comst.2021.3094360   DOI
29 https://blog.lgcns.com/1741
30 David B., Maede Z., Aiman E., Raj J., Khaled K., Nader M., "Cybersecurity for Industrial Control Systems: A Survey", Industrial Control Systems Security, 2019. https://doi.org/10.48550/arXiv.2002.04124   DOI
31 Yong-Hee Jeon, "산업제어시스템 보안을 위한 네트워크 설계 및 구조", Korea Institute of Information Security & Cryptology, v.19, Issue 5, 2009.
32 Austris U., Bernhards B., "Industrial and Automation Control System Cyber Range Prototype for Offensive Capability Development", 8th International Conference on Information Systems Security and Privacy, 2022. https://doi.org/10.5220/0010879500003120   DOI
33 Myung-Kil Ahn, Jung-Ryun Lee, "Research on Threat Analysis methodology based on ICS-ATT&CK for ICS/SCADA system", 2020.