Abstract
Due to trends in modern infrastructure development and usage, the attacks on Industrial Control Systems (ICS) are inevitable. New threats and other forms of attacks are constantly emerging to exploit vulnerabilities in system compromising the security parameters such as Confidentiality, Integrity and Availability (CIA). Injection attacks also termed as False Data Injection Attacks (FDIA) are the complex attacks on the ICS. FDIA affects the data integrity of a packet by modifying their payloads and are considered as an intrusion via remote access. In FDIA, attackers gain access to a critical process or process parameters in ICS and forces them to execute according to the newly injected code or command. For our research, a process control plant from Integrated Automation laboratory was used to acquire different parameters related to ICS. Injection attacks such as measurement injection and command injection were simulated and injected into the obtained plant data. Convolutional Neural Networks (CNN) is used to evaluate the functionality of identifying those injection attacks. Multiple steps such as pre-processing, feature extraction, data transformation and image representation were performed in order to feed the CNN with the simulated plant data. A 3-layered fully connected CNN architecture with non-linear ReLU activation is built along with a SoftMax classification layer for classifying the input data as a normal or an attack. A proper training of CNN is done by checking the variance to avoid overfitting and underfitting of the network. Performance parameters such as accuracy, recall, precision F-measure and Cohen’s kappa coefficient were computed. CNN outperforms in the performance compared to other deep learning approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ISA: ISA99, Industrial automation and control systems security. https://www.isa.org/isa99/. Accessed 07 Mar 2019
The White House and Washington: PRESIDENTIAL DECISION DIRECTIVE/NSC-63. https://fas.org/irp/offdocs/pdd/pdd-63.htm. Accessed 07 Mar 2019
Nigam, R.: (Known) SCADA attacks over the year, Security Research. https://blog.fortinet.com/2015/02/12/known-scada-attacks-over-the-years (2015). Accessed 15 Sept 2017
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: The spread of the sapphire/slammer worm
Legezo, D.: Operation Ghoul: learning from the targeted attack analysis to protect your business. https://www.kaspersky.com/blog/ghoul/5897/ (2016). Accessed 15 Sept 2017
Thompson, M.: Iranian cyber attack on New York dam shows future of war. http://time.com/4270728/iran-cyber-attack-dam-fbi/ (2016). Accessed 15 Sept 2017
Colbert, E.J., Kott, A.: Cyber-Security of SCADA and other Industrial Control Systems, 63rd edn. Springer (2016)
Morris, T., Gao, W.: Industrial control system cyber attacks. In: International Symposium on ICS SCADA Cyber Security Research, pp. 22–29 (2013)
Mangrulkar, N.S.: Network attacks and their detection mechanisms: A Review 90(9), 36–39 (2014)
Mo, Y., Sinopoli, B.: False data injection attacks in control systems. In: Conference on DecisionControl (2010)
Potluri, S., Diedrich, C., Sangala, G.K.R.: Identifying false data injection attacks in industrial control systems using artificial neural networks. In: Emergeing Technology in Factory Automation ETFA 2017 (2017)
Huang, H., Kasiviswanathan, S., Electric, G.: Streaming anomaly detection using online matrix sketching 9(3), 1–15 (2015)
F. O. for I. Security. Industrial control system security (2016)
Willsky, A.S.: A survey of design methods for failure detection in dynamic systems. Automatica 12(6), 601–611 (1976)
Yu, Z.H., Chin, W.L.: Blind false data injection attack using PCA approximation method in smart grid. IEEE Trans. Smart Grid 6(3), 1219–1226 (2015)
Kamesh, Sakthi Priya, N.: Security enhancement of authenticated RFID generation. Int. J. Appl. Eng. Res. 9(22), 5968–5974 (2014)
Alrawashdeh, K., Purdy, C.: Toward an online anomaly intrusion detection system based on deep learning. In: 15th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 195–200 (2016)
Kaur, H., Minhas, J., Singh, G.: A review of machine learning based anomaly detection techniques. Int. J. Comput. Appl. Technol. Res. 2(2), 185–187 (2013)
Van, N.T., Thinh, T.N.: An anomaly-based network intrusion detection system using deep learning. In: International Conference on System Science and Engineering (ICSSE) (2017)
Yu, W., Griffith D., Ge, L., Bhattarai, S., Golmie, N.: An integrated detection system against false data injection attacks in the smart grid. Secur. Commun. Netw. 8, 91–109 (2014)
Huang, S., Zhou, C., Yang, S., Qin, Y.: Cyber-physical system security for networked 12, 567–578 (2015)
Pang, Z., Hou, F., Zhou, Y.: Design of false data injection attacks for output tracking control of CARMA systems. In: International Conference on Information and Automation, pp. 1273–1277 (2015)
Rabatel, J., Bringay, S., Poncelet, P.: Anomaly detection in monitoring sensor data for preventive maintenance. Expert Syst. Appl. 38(6), 7003–7015 (2011)
Hill, D.J., Minsker, B.S., Amir, E.: Real-time Bayesian anomaly detection in streaming environmental data. Water Resour. Res. 46(4), 1–16 (2010)
Pradhan, S.K.S.M., Pradhanm, S.K.: Anomaly detection using artificial neural networks. Int. J. Eng. Sci. Emerg. Technol. 2(1), 29–36 (2012)
Siripanadorn, S.: Anomaly detection using self-organizing map and wavelets in wireless sensor networks. In: Proceedings of the 10th WSEA, pp. 291–297 (2010)
Guan, Z., Sun, N., Xu, Y.: A comprehensive survey of false data injection in smart grid. Mob. Comput. 8(1) (2015)
Wang, D., Guan, X., Liu, T., Gu, Y., Sun, Y., Liu, Y.: A survey on bad data injection attack in smart grid
Baig, Z.A., Amoudi, A.: An analysis of smart grid attacks and countermeasures 8(8) (2013)
Anwar, A.: Vulnerabilities of smart grid state estimation against false data injection attack cyber incidents in different sector in renewable energy integration, green energy and technology (2014)
Esmalifalak, M., Member, S., Liu, L., Member, S.: Detecting stealthy false data injection using machine learning in smart grid, 1–9 (2014)
Hao, J., Member, S., Piechocki, R.J., Kaleshi, D.: Sparse malicious false data injection attacks and defense mechanisms in smart grids 3203, 1–12 (2015)
Potluri, S., Diedrich, C., Sangala, G.K.R.: Identifying false data injection attacks in industrial control systems using artificial neural networks. In: 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 1–8 (2017)
Famili, A., Shen, W., Weber, R., Simoudis, E.: Data preprocessing and intelligent data analysis 1, 3–23 (1997)
Siekmann, J., Wahlster, W.: Advanced intelligent computing theories and applications
MaxStat: tools for scientific data analysis—Statistics. http://www.maxstat.de/statistical-tests.html. Accessed 15 Sep 2017
Wu, J.: Introduction to convolutional neural networks. 1–28, (2016)
Agarap, A.F.: Deep learning using rectified linear units (ReLU), 1 (2018)
Wu, H., Gu, X.: Max-pooling dropout for regularization of convolutional neural networks. Lecture Notes in Computer Science (including Subseries Lecture Notes in Artificial Intelligence, Lecture Notes in Bioinformatics), vol. 9489, pp. 46–54 (2015)
ujjwalkarn: An intuitive explanation of convolutional neural networks. The data science blog. https://ujjwalkarn.me/2016/08/11/intuitive-explanation-convnets/ (2016). Accessed 06 May 2018
Bhandare, A., Bhide, M., Gokhale, P., Chandavarkar, R.: Applications of convolutional neural networks. Int. J. Comput. Sci. Inf. Technol. 7(5), 2206–2215 (2016)
Festo Didactic: MPS® PA Compact-Workstation mit Füllstands-, Durchfluss-, Druck- und Temperaturregelstrecken. http://www.festo-didactic.com/de-de/lernsysteme/prozessautomation,regelungstechnik/compact-workstation/mps-pa-compact-workstation-mit-fuellstands-,durchfluss-,druck-und-temperaturregelstrecken.htm?fbid=ZGUuZGUuNTQ0LjEzLjE4Ljg4Mi40Mzc2. Accessed 15 Sep 2017
MathWorks: Training a model from Scratch—MATLAB & Simulink. https://www.mathworks.com/solutions/deep-learning/examples/training-a-model-from-scratch.html. Accessed 07 Mar 2019
MathWorks: Options for training deep learning neural network. https://www.mathworks.com/help/deeplearning/ref/trainingoptions.html. Accessed 07 Mar 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Potluri, S., Ahmed, S., Diedrich, C. (2020). Securing Industrial Control Systems from False Data Injection Attacks with Convolutional Neural Networks. In: Pedrycz, W., Chen, SM. (eds) Development and Analysis of Deep Learning Architectures. Studies in Computational Intelligence, vol 867. Springer, Cham. https://doi.org/10.1007/978-3-030-31764-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-31764-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-31763-8
Online ISBN: 978-3-030-31764-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)