Back to Search Start Over

SCADA securing system using deep learning to prevent cyber infiltration.

Authors :
Diaba, Sayawu Yakubu
Anafo, Theophilus
Tetteh, Lord Anertei
Oyibo, Michael Alewo
Alola, Andrew Adewale
Shafie-khah, Miadreza
Elmusrati, Mohammed
Source :
Neural Networks. Aug2023, Vol. 165, p321-332. 12p.
Publication Year :
2023

Abstract

Supervisory Control and Data Acquisition (SCADA) systems are computer-based control architectures specifically engineered for the operation of industrial machinery via hardware and software models. These systems are used to project, monitor, and automate the state of the operational network through the utilization of ethernet links, which enable two-way communications. However, as a result of their constant connectivity to the internet and the lack of security frameworks within their internal architecture, they are susceptible to cyber-attacks. In light of this, we have proposed an intrusion detection algorithm, intending to alleviate this security bottleneck. The proposed algorithm, the Genetically Seeded Flora (GSF) feature optimization algorithm, is integrated with Transformer Neural Network (TNN) and functions by detecting changes in operational patterns that may be indicative of an intruder's involvement. The proposed Genetically Seeded Flora Transformer Neural Network (GSFTNN) algorithm stands in stark contrast to the signature-based method employed by traditional intrusion detection systems. To evaluate the performance of the proposed algorithm, extensive experiments are conducted using the WUSTL-IIOT-2018 ICS SCADA cyber security dataset. The results of these experiments indicate that the proposed algorithm outperforms traditional algorithms such as Residual Neural Networks (ResNet), Recurrent Neural Networks (RNN), and Long Short-Term Memory (LSTM) in terms of accuracy and efficiency. • The paper proposes a hybrid algorithm called the Genetically Seeded Flora Transformer Neural Network (GSFTNN) to detect intrusion in smart grid SCADA systems. • The performance of the proposed algorithm was evaluated using the WUSTL-IIOT-2018 SCADA cyber security dataset. • The proposed algorithm outperforms traditional intrusion detection systems such as ResNet, RNN, and LSTM in terms of accuracy and efficiency. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
08936080
Volume :
165
Database :
Academic Search Index
Journal :
Neural Networks
Publication Type :
Academic Journal
Accession number :
169815611
Full Text :
https://doi.org/10.1016/j.neunet.2023.05.047