Enhanced Anomaly Detection in Industrial Control Systems aided by Machine Learning

Vegard Berge,Chunlei Li
2024-10-26
Abstract:Traditional intrusion detection systems (IDSs) often rely on either network traffic or process data, but this single-source approach may miss complex attack patterns that span multiple layers within industrial control systems (ICSs) or persistent threats that target different layers of operational technology systems. This study investigates whether combining both network and process data can improve attack detection in ICSs environments. Leveraging the SWaT dataset, we evaluate various machine learning models on individual and combined data sources. Our findings suggest that integrating network traffic with operational process data can enhance detection capabilities, evidenced by improved recall rates for cyber attack classification. Serving as a proof-of-concept within a limited testing environment, this research explores the feasibility of advancing intrusion detection through a multi-source data approach in ICSs. Although the results are promising, they are preliminary and highlight the need for further studies across diverse datasets and refined methodologies.
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is that in industrial control systems (ICSs), traditional intrusion detection systems (IDSs) usually rely on a single data source (such as network traffic or process data), which may lead to the omission of complex attack patterns, especially those attacks that span multiple levels or persistent threats against different operational technology (OT) systems. Therefore, this paper studies whether combining network and process data can improve the attack detection ability in the ICS environment. Specifically, the main research questions include: 1. **How to apply machine - learning models to detect network and process data anomalies in ICS?** 2. **Can integrating these two data types improve the overall detection ability and reduce false positives, compared with models trained only with network or process data?** 3. **What are the limitations of current intrusion detection methods, and how can this research help overcome these limitations?** Through these questions, the author aims to explore the potential of multi - source data in enhancing ICS intrusion detection and evaluate its feasibility and effectiveness in practical applications.