SwePub
Sök i LIBRIS databas

  Utökad sökning

id:"swepub:oai:DiVA.org:mdh-65227"
 

Sökning: id:"swepub:oai:DiVA.org:mdh-65227" > Anomaly Detection D...

Anomaly Detection Dataset for Industrial Control Systems

Dehlaghi Ghadim, Alireza (författare)
RISE,Mälardalens universitet,Inbyggda system,RISE Res Inst, S-50115 Pitea, Sweden.,Industriella system,Mälardalens University, Sweden
Helali Moghadam, Mahshid (författare)
Mälardalens universitet,Inbyggda system,Malardalen Univ, Sch Innovat Design & Engn, S-72123 Vasteras, Sweden.,Mälardalens University, Sweden
Balador, Ali (författare)
Mälardalens universitet,Inbyggda system,Mälardalens University, Sweden
visa fler...
Hansson, Hans (författare)
RISE,Mälardalens universitet,Inbyggda system,RISE Res Inst, S-50115 Pitea, Sweden.,Industriella system,Mälardalens University, Sweden
visa färre...
 (creator_code:org_t)
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2023
2023
Engelska.
Ingår i: IEEE Access. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2169-3536. ; 11, s. 107982-107996
  • Tidskriftsartikel (refereegranskat)
Abstract Ämnesord
Stäng  
  • Over the past few decades, Industrial Control Systems (ICS) have been targeted by cyberattacks and are becoming increasingly vulnerable as more ICSs are connected to the internet. Using Machine Learning (ML) for Intrusion Detection Systems (IDS) is a promising approach for ICS cyber protection, but the lack of suitable datasets for evaluating ML algorithms is a challenge. Although a few commonly used datasets may not reflect realistic ICS network data, lack necessary features for effective anomaly detection, or be outdated. This paper introduces the 'ICS-Flow' dataset, which offers network data and process state variables logs for supervised and unsupervised ML-based IDS assessment. The network data includes normal and anomalous network packets and flows captured from simulated ICS components and emulated networks, where the anomalies were applied to the system through various cyberattacks. We also proposed an open-source tool, "ICSFlowGenerator," for generating network flow parameters from Raw network packets. The final dataset comprises over 25,000,000 raw network packets, network flow records, and process variable logs. The paper describes the methodology used to collect and label the dataset and provides a detailed data analysis. Finally, we implement several ML models, including the decision tree, random forest, and artificial neural network to detect anomalies and attacks, demonstrating that our dataset can be used effectively for training intrusion detection ML models.

Ämnesord

NATURVETENSKAP  -- Data- och informationsvetenskap -- Datavetenskap (hsv//swe)
NATURAL SCIENCES  -- Computer and Information Sciences -- Computer Sciences (hsv//eng)

Nyckelord

Anomaly detection dataset
industrial control system
intrusion detection
cyberattack
network flow
artificial intelligence

Publikations- och innehållstyp

ref (ämneskategori)
art (ämneskategori)

Hitta via bibliotek

Till lärosätets databas

Sök utanför SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy