Skip to main content
Log in

Attack detection and prevention in IoT-SCADA networks using NK-classifier

  • Soft computing in decision making and in modeling in economics
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Supervisory control and data acquisition (SCADA) stands as a control system consisting of computers and networked data communications. At present, many industries use SCADA to monitor as well as control the processes. In recent days, numerous attacks are targeting these systems. Thus, the furtherance of high-security SCADA is much-needed one on account of its susceptibility to attacks centered on the architectural restriction. To identify these attacks, numerous classifications, optimization methods, and intrusion detecting systems (IDS) are posited. The chief drawbacks of this prevailing work are detecting accuracy, high training time, and security. For prevailing over these disadvantages, an NK-RNN classifier is proposed to recognize the intrusions in the SCADA method. Initially, the features from the datasets are organized, and the important attributes are chosen by utilizing the Elephant Herding Optimization (EHO). Secondly, the data, which is optimized, are grouped and classified by applying the NK-RNN classifier. Then, the outcomes, which are classified, are assessed and utilized to outcome prediction. In normal data, Caesar Ciphering is employed for the prevention of attacks and also the modified elliptic curve cryptography is employed for enhancing the security level. From the performance assessment, it is revealed that the NK-RNN method attains superior performance than the prevailing classification method along with IDS algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Availability of data and materials

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

References

  • Abusafat F, Pereira T, Santos H (2018) Proposing a behavior-based IDS model for IoT environment. In: International Journal of European symposium on systems analysis and design. Springer, Cham, pp 114–134

  • Almalawi A, Fahad A, Tari Z, Alamri A, AlGhamdi R, Zomaya AY (2015) An efficient data-driven clustering technique to detect attacks in SCADA systems. IEEE Trans Inf Forensics Secur 11(5):893–906

    Article  Google Scholar 

  • Ambusaidi MA, He X, Nanda P, Tan Z (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput 65(10):2986–2998

    Article  MathSciNet  Google Scholar 

  • Amin S, Litrico X, Sastry SS, Bayen AM (2012) Cyber security of water SCADA systems—part II attack detection using enhanced hydrodynamic models. IEEE Trans Control Syst Technol 21(5):1679–1693

    Article  Google Scholar 

  • Cherdantseva Y, Burnap P, Blyth A, Eden P, Jones K, Soulsby H, Stoddart K (2016) A review of cyber security risk assessment methods for SCADA systems. Comput Secur 56:1–27

    Article  Google Scholar 

  • Enescu FM, Bizon N (2017) SCADA applications for electric power system. Reactive power control in AC power systems, 1st edn. Springer, Cham, pp 561–609

    Chapter  Google Scholar 

  • Finogeev AG, Finogeev AA (2017) Information attacks and security in wireless sensor networks of industrial SCADA systems. J Ind Inf Integr 5:6–16

    Google Scholar 

  • Ghosh S, Sampalli S (2019) A survey of security in SCADA networks current issues and future challenges. IEEE Access 7:135812–135831

    Article  Google Scholar 

  • Goldenberg N, Wool A (2013) Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. Int J Crit Infrastruct Prot 6(2):63–75

    Article  Google Scholar 

  • Hassan WH (2019) Current research on Internet of Things (IoT) security: a survey. Comput Netw 148:283–294

    Article  Google Scholar 

  • Hemdan EE-D, Manjaiah DH (2018) Cybercrimes investigation and intrusion detection in internet of things based on data science methods. In: Cognitive computing for big data systems over IoT. Springer, Cham, pp 39–62

  • Kalech M (2019) Cyber-attack detection in SCADA systems using temporal pattern recognition techniques. Comput Secur 84:225–238

    Article  Google Scholar 

  • Krishnan Sadhasivan D, Balasubramanian K (2017) A novel LWCSO-PKM-based feature optimization and classification of attack types in SCADA network. Arab J Sci Eng 42(8):3435–3449

    Article  Google Scholar 

  • Li W, Xie L, Deng Z, Wang Z (2016) False sequential logic attack on SCADA system and its physical impact analysis. Comput Secur 58:149–159

    Article  Google Scholar 

  • Lin C-Y, Nadjm-Tehrani S, Asplund M (2017) Timing-based anomaly detection in SCADA networks. In: International conference on critical information infrastructures security. Springer, Cham, pp 48–59

  • Lin H, Slagell A, Kalbarczyk ZT, Sauer PW, Iyer RK (2018) Runtime semantic security analysis to detect and mitigate control-related attacks in power grids. IEEE Trans Smart Grid 9(1):163–178

    Article  Google Scholar 

  • Lu K-D, Zeng G-Q, Luo X, Weng J, Luo W, Wu Y (2021) Evolutionary deep belief network for cyber-attack detection in industrial automation and control system. IEEE Trans Ind Inform 17(11):7618–7627

    Article  Google Scholar 

  • McEvoy TR, Wolthusen SD (2011) Defeating node based attacks on SCADA systems using probabilistic packet observation. In: International workshop on critical information infrastructures security. Springer, Berlin, pp 70–80

  • Nazir S, Patel S, Patel D (2017) Assessing and augmenting SCADA cyber security a survey of techniques. Comput Secur 70:436–454

    Article  Google Scholar 

  • Samdarshi R, Sinha N, Tripathi P (2015) A triple layer intrusion detection system for SCADA security of electric utility. In: Annual IEEE India conference (INDICON), 17–20 December, New Delhi, India, pp 1–5

  • Shahzad A, Udagepola KP, Lee Y, Park S, Lee M (2015a) The sensors connectivity within SCADA automation environment and new trends for security development during multicasting routing transmission. Int J Distrib Sens Netw. https://doi.org/10.1155/2015/738687

    Article  Google Scholar 

  • Shahzad A, Xiong N, Irfan M, Lee M, Hussain S, Khaltar B (2015b) A SCADA intermediate simulation platform to enhance the system security. In: 17th International conference on advanced communication technology (ICACT), 1–3 july, PyeongChang, Korea (South), pp 368–373

  • Shitharth S (2017) An enhanced optimization based algorithm for intrusion detection in SCADA network. Comput Secur 70:16–26

    Article  Google Scholar 

  • Shitharth S, Sangeetha K, Praveen Kumar B (2020) Integrated probabilistic relevancy classification (PRC) scheme for intrusion detection in SCADA network. In: Design frameworks for wireless networks. Springer, Singapore, pp 41–63

  • Shlomo A, Kalech M, Moskovitch R (2020) Temporal pattern-based malicious activity detection in SCADA systems. Comput Secur. https://doi.org/10.1016/j.cose.2020.102153

    Article  Google Scholar 

  • Upadhyay D, Sampalli S (2020) SCADA (Supervisory Control and Data Acquisition) systems vulnerability assessment and security recommendations. Comput Secur 89:101666

    Article  Google Scholar 

  • Yang Y, McLaughlin K, Sezer S, Littler T, Im EG, Pranggono B, Wang HF (2014) Multiattribute SCADA-specific intrusion detection system for power networks. IEEE Trans Power Deliv 29(3):1092–1102

    Article  Google Scholar 

  • Yılmaz EN, Gönen S (2018) Attack detection/prevention system against cyber attack in industrial control systems. Comput Secur 77:94–105

    Article  Google Scholar 

Download references

Acknowledgements

We thank the anonymous referees for their useful suggestions.

Funding

This work has no funding resource.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Mr. YJ, Dr. PJ. The first draft of the manuscript was written by Mr. YJ and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Y. Justindhas.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent of publication

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Justindhas, Y., Jeyanthi, P. Attack detection and prevention in IoT-SCADA networks using NK-classifier. Soft Comput 26, 6811–6823 (2022). https://doi.org/10.1007/s00500-022-06921-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-022-06921-3

Keywords

Navigation