Intrusion detection through SCADA systems using fuzzy logic-based state estimation methods

نویسندگان

  • Keith E. Holbert
  • Amitabh Mishra
  • Lamine Mili
چکیده

Supervisory Control And Data Acquisition (SCADA) systems represent a vulnerability in vital infrastructures. For example, an electric power system is subjected to intrusions via its SCADA systems; however, the instrumentation provides detectable variations in response to such interference. Presented herein is a strategy that augments state estimation methods using a Hybrid Fuzzy System for fault monitoring and diagnosis that aims to combine information from multiple domains in order to detect, isolate, identify, and mitigate threats to the system. Furthermore, to endow the state estimation solution methods with some degree of numerical robustness, algorithm-based error detection (ABED) is applied to the Gaussian elimination procedure. Simulation results revealed that ABED provides error detection at low costs and excellent error coverage for floating point arithmetic in the presence of permanent bit and word errors while being free of false alarms and insensitive to both data range and data size.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Designing an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic

One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...

متن کامل

Exploiting SCADA vulnerabilities using a Human Interface Device

SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infrastructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Logic Controllers) are one of the most critical components of a control system. Cyber-attacks usually target valuable infrastructures assets, taking advantage of architectural/tech...

متن کامل

INTEGRATING FUZZY LOGIC WITH DATA MINING METHODS FOR INTRUSION DETECTION By

This report explores integrating fuzzy logic with two data mining methods (association rules and frequency episodes) for intrusion detection. Data mining methods are capable of extracting patterns automatically from a large amount of data. The integration with fuzzy logic can produce more abstract and flexible patterns for intrusion detection, since many quantitative features are involved in in...

متن کامل

Intrusion Detection Method Based on Fuzzy Conditional Random Fields ?

Intrusion detection system is the indispensable part of every computer. With the increasing attack means, all kinds of intrusion detection methods have appeared. Compared with other intrusion detection methods, the intrusion detection methods based on Conditional Random Fields (CRFs) has better detection effect, but the problems that the accuracy is low when the training data is small and the t...

متن کامل

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJCIS

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2007