Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system

Vulnerabilities in the Industrial Control Systems (ICSs) and Supervisory Control and Data Acquisition (SCADA) systems are constantly increasing as these systems incorporate innovative technologies such as the Internet of Things (IoT). As a result of these advancements, the SCADA system became more...

Full description

Saved in:
Bibliographic Details
Main Authors: Balla, Asaad, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Mubarak, Sinil
Format: Article
Language:English
Published: Elsevier 2022
Subjects:
Online Access:http://irep.iium.edu.my/98761/7/98761_Applications%20of%20deep%20learning%20algorithms.pdf
http://irep.iium.edu.my/98761/
https://www.sciencedirect.com/journal/cleaner-engineering-and-technology
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
Description
Summary:Vulnerabilities in the Industrial Control Systems (ICSs) and Supervisory Control and Data Acquisition (SCADA) systems are constantly increasing as these systems incorporate innovative technologies such as the Internet of Things (IoT). As a result of these advancements, the SCADA system became more efficient, simpler to operate, but more exposed to cyber-attacks. A well-planned cyber-attack against SCADA systems can have catastrophic consequences, including physical property damage and even fatalities. To secure these critical infrastructures, security measures should be examined and implemented. These methods could be hardware-based, such as Intrusion Detection Systems (IDS), software-based, or managerial-based. In this paper, we have examined and presented the most recent research on developing robust IDSs using Deep Learning (DL) algorithms, including Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), Stacked Autoencoders (SAE), and Deep Belief Networks (DBN). For each algorithm, prior works have been identified, examined, and described based on their conceptual similarities. A comparison between different IDS-DL models is provided based on their performance metrics. Because data is such a crucial component of the training and evaluation of IDS-DL models, some of the most utilized network datasets in DL are discussed. The challenges facing DL applications in IDS development are also discussed, as well as future research direction and recommendations.