• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Wang, Jiexi (Wang, Jiexi.) | Lai, Yingxu (Lai, Yingxu.) | Liu, Jing (Liu, Jing.)

Indexed by:

EI Scopus SCIE

Abstract:

Industrial control systems (ICS) face severe threats due to the inherent vulnerability of shared networks. Among the attacks against ICS, stealthy attack is an attack behavior in which an attacker injects false sensor measurements or drives signals into the control loop, evading detection by the intrusion detection system (IDS). They are highly destructive and difficult to detect because of concealment. In related studies, data-driven methods have the shortcomings of a large computation burden. Physics-based methods are usually difficult and expensive to change the system structure. Moreover, most of the current methods against stealthy attacks take up a considerable amount of system resources due to training or the pursuit of robustness. In this paper, using the importance and correlation of neglected feature data, an stealthy attack detection method based on the Multi-feature LSTM (MFLSTM) model is innovatively developed to predict and recover data attacked. Random Forest (RF) scores and heatmap are used to judge the importance and correlation of the feature data. Then the forget gates of the LSTM model are improved to construct an MFLSTM model that can learn predictive information from other feature data and decouples the attack conditions that stealthy attack relies on. The testing results indicated that MFLSTM has significant advantages in prediction accuracy, stability, and resource-saving. MFLSTM model saved 52.3% of the resources required for the same type of prediction. The single-point prediction mean square error (MSE) for the STEP 7 (S7) protocol attack signature prediction and secure water treatment (SWaT) dataset were 0.0471 and 0.0035, respectively, which also demonstrates the feasibility of our proposed method. © 2022 Elsevier B.V.

Keyword:

Feature extraction Digital storage Network security Computer crime Forecasting Control systems Intrusion detection Decision trees Long short-term memory Mean square error

Author Community:

  • [ 1 ] [Wang, Jiexi]Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing; 100124, China
  • [ 2 ] [Lai, Yingxu]Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing; 100124, China
  • [ 3 ] [Lai, Yingxu]Engineering Research Center of Intelligent Perception and Autonomous Control, Ministry of Education, Beijing; 100124, China
  • [ 4 ] [Liu, Jing]Faculty of Information Technology, Beijing University of Technology, Beijing, Beijing; 100124, China

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

Future Generation Computer Systems

ISSN: 0167-739X

Year: 2022

Volume: 137

Page: 248-259

7 . 5

JCR@2022

7 . 5 0 0

JCR@2022

ESI Discipline: COMPUTER SCIENCE;

ESI HC Threshold:46

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 9

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 9

Affiliated Colleges:

Online/Total:1064/10558511
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.