A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks (original) (raw)

References

  1. Liang G, Weller SR, Luo F, Zhao J, Dong ZY (2018) Distributed blockchain-based data protection framework for modern power systems against cyber attacks. IEEE Trans Smart Grid 10(3):3162
    Article Google Scholar
  2. Cortés J., Dullerud GE, Han S, Le Ny J, Mitra S, Pappas GJ (2016) Differential privacy in control and network systems. In: 2016 IEEE 55th conference on decision and control (CDC). IEEE, pp 4252–4272
  3. Song H, Fink GA, Jeschke S (2017) Security and privacy in Cyber-physical systems. Wiley Online Library, New York
    Book Google Scholar
  4. Lu R, Zhu H, Liu X, Liu JK, Shao J (2014) Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28(4):46
    Article Google Scholar
  5. Keshk M, Sitnikova E, Moustafa N, Hu J, Khalil I (2019) An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems. IEEE Trans Sustain Comput.
  6. Deng R, Xiao G, Lu R, Liang H, Vasilakos AV (2016) False data injection on state estimation in power systems—attacks, impacts, and defense: A survey. IEEE Trans Ind Inform 13(2):411
    Article Google Scholar
  7. Keshk M, Moustafa N, Sitnikova E, Creech G (2017) Privacy preservation intrusion detection technique for scada systems. In: 2017 Military communications and information systems conference (MilCIS). IEEE, pp 1–6
  8. Liu X, Li Z, Li Z (2015) Impacts of bad data on the pmu based line outage detection. arXiv:1502.04236
  9. Power systems datasets. (Available: https://sites.google.com/a/uah.edu/tommy-morris-uah/ics-data-sets)
  10. Moustafa N, Slay J (2015) Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military communications and information systems conference (MilCIS). IEEE, pp 1–6
  11. Moustafa N, Hu J, Slay J (2019) A holistic review of network anomaly detection systems: A comprehensive survey. J Netw Comput Appl 128:33
    Article Google Scholar
  12. Moustafa N, Slay J, Creech G (2017) Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Trans Big Data 5(4):481–494
    Article Google Scholar
  13. Aggarwal CC, Philip SY (2008) A general survey of privacy-preserving data mining models and algorithms. In: Privacy-preserving data mining. Springer, pp 11–52
  14. Fahad A, Tari Z, Almalawi A, Goscinski A, Khalil I, Mahmood A (2014) Ppfscada: Privacy preserving framework for scada data publishing. Futur Gener Comput Syst 37:496
    Article Google Scholar
  15. Dua S, Du X (2016) Data mining and machine learning in cybersecurity. CRC press, Boca Raton
    Book Google Scholar
  16. Khan IA, Pi D, Khan ZU, Hussain Y, Nawaz A (2019) Hml-ids: A hybrid-multilevel anomaly prediction approach for intrusion detection in scada systems. IEEE Access 7:89507
    Article Google Scholar
  17. Khan IA, Pi D, Yue P, Li B, Khan ZU, Hussain Y, Nawaz A (2019) Efficient behaviour specification and bidirectional gated recurrent units-based intrusion detection method for industrial control systems. Electron Lett 56(1):27
    Article Google Scholar
  18. Gai K, Wu Y, Zhu L, Qiu M, Shen M (2019) Privacy-preserving energy trading using consortium blockchain in smart grid. IEEE Trans Ind Inform 5(6):3548–3558
    Article Google Scholar
  19. Mohebali B, Tahmassebi A, Meyer-Baese A, Gandomi AH (2020) Probabilistic neural networks: a brief overview of theory, implementation, and application. In: Handbook of probabilistic models. Elsevier, pp 347–367
  20. Zeinali Y, Story BA (2017) Competitive probabilistic neural network. Integr Comput Aided Eng 24(2):105
    Article Google Scholar
  21. Lu J, Wong RK (2019) Insider threat detection with long short-term memory. In: Proceedings of the australasian computer science week multiconference. ACM, p 1
  22. Adesuyi TA, Kim BM (2019) A layer-wise perturbation based privacy preserving deep neural networks. In: 2019 International conference on artificial intelligence in information and communication (ICAIIC). IEEE, pp 389–394
  23. Han W, Xue J, Wang Y, Liu Z, Kong Z (2019) Malinsight: A systematic profiling based malware detection framework. J Netw Comput Appl 125:236
    Article Google Scholar
  24. Gope P, Sikdar B (2019) An efficient privacy-preserving authentication scheme for energy internet-based vehicle-to-grid communication. IEEE Trans Smart Grid 10(6): 6607–6618
    Article Google Scholar
  25. Shen M, Tang X, Zhu L, Du X, Guizani M (2019) Privacy-preserving support vector machine training over blockchain-based encrypted iot data in smart cities. IEEE Internet Things J 6(5):7702–7712
    Article Google Scholar
  26. Xie X, Wang B, Wan T, Tang W (2020) Multivariate abnormal detection for industrial control systems using 1d cnn and gru. IEEE Access 8:88348
    Article Google Scholar
  27. Yang K, Li Q, Lin X, Chen X, Sun L (2020) ifinger: Intrusion detection in industrial control systems via register-based fingerprinting. IEEE J Sel Areas Commun 38(5):955
    Article Google Scholar
  28. Al-Abassi A, Karimipour H, Dehghantanha A, Parizi RM (2020) An ensemble deep learning-based cyber-attack detection in industrial control system. IEEE Access 8:83965
    Article Google Scholar
  29. Hu Y, Li H, Luan TH, Yang A, Sun L, Wang Z, Wang R (2020) Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. Futur Gener Comput Syst 108:1230
    Article Google Scholar
  30. Krithivasan P. S K, P S S. Sriram V S (2020) Detection of cyberattacks in industrial control systems using enhanced principal component analysis and hypergraph based convolution neural network (epca-hg-cnn). IEEE Trans Ind Appl 56(4):4394–4404
    Article Google Scholar
  31. Xu M, Li X, Wang Y, Luo B, Guo J (2020) Privacy-preserving multisource transfer learning in intrusion detection system. Trans Emerg Telecommun Technol, pp e3957
  32. Alkadi O, Moustafa N, Turnbull B, Choo KKR (2020) A deep blockchain framework-enabled collaborative intrusion detection for protecting iot and cloud networks. IEEE Internet Things J
  33. Tian Q, Han D, Li KC, Liu X, Duan L, Castiglione A (2020) An intrusion detection approach based on improved deep belief network. Appl Intell 50:3162–3178
    Article Google Scholar
  34. Kaja N, Shaout A, Ma D (2019) An intelligent intrusion detection system. Appl Intell 49 (9):3235
    Article Google Scholar
  35. Çavuşoğlu Ü (2019) A new hybrid approach for intrusion detection using machine learning methods. Appl Intell 49(7):2735
    Article Google Scholar
  36. Kirda E, Kruegel C, Banks G, Vigna G, Kemmerer R (2006) Behavior-based spyware detection. In: Usenix security symposium, p 694
  37. Inoue D, Yoshioka K, Eto M, Hoshizawa Y, Nakao K (2009) Automated malware analysis system and its sandbox for revealing malware’s internal and external activities. IEICE Trans Inf Syst 92(5):945
    Article Google Scholar
  38. Moustafa N, Slay J (2016) The evaluation of network anomaly detection systems: Statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Inf Secur J Glob Perspect 25(1-3):18
    Article Google Scholar
  39. Eberhart R, Kennedy J (1995) A new optimizer using particle swarm theory. In: Proceedings of the sixth international symposium on micro machine and human science, MHS’95. IEEE, pp 39–43
  40. Clerc M, Kennedy J (2002) The particle swarm-explosion, stability, and convergence in a multidimensional complex space. IEEE Trans Evol Comput 6(1):58
    Article Google Scholar
  41. Eberhart RC, Shi Y, Kennedy J (2001) Swarm intelligence. Elsevier, New York
    Google Scholar
  42. Parsopoulos K, Vrahatis M (2002) Initializing the particle swarm optimizer using the nonlinear simplex method. Adv Intell Syst Fuzzy Syst Evol Comput 216:1
    Google Scholar
  43. Specht DF (1990) Probabilistic neural networks. Neural Netw 3(1):109
    Article Google Scholar
  44. Oliveira SR, Zaiane OR (2010) Privacy preserving clustering by data transformation. J Inf Data Manag 1(1):37
    Google Scholar
  45. Banu RV, Nagaveni N (2013) Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario. Inform Sci 232:437
    Article Google Scholar
  46. Tan Z, Jamdagni A, He X, Nanda P, Liu RP, Hu J (2014) Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans Comput 64(9):2519
    Article MathSciNet Google Scholar
  47. Hink RCB, Beaver JM, Buckner MA, Morris T, Adhikari U, Pan S (2014) Machine learning for power system disturbance and cyber-attack discrimination. In: 2014 7th International symposium on resilient control systems (ISRCS). IEEE, pp 1–8
  48. McDermott CD, Petrovski A (2017) Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks. International journal of computer networks and communications 9(4)
  49. Ashfaq RAR, Wang XZ, Huang JZ, Abbas H, He YL (2017) Fuzziness based semi-supervised learning approach for intrusion detection system. Inform Sci 378:484
    Article Google Scholar
  50. Ambusaidi MA, He X, Nanda P, Tan Z (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput 65(10):2986
    Article MathSciNet Google Scholar
  51. Petersen R (2015) Data mining for network intrusion detection: A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks, Ph.D. dissertation, Dept. Inf. Commun. Syst., Mid Sweden Univ., Sundsvall, Sweden

Download references