《计算机应用》唯一官方网站 ›› 2024, Vol. 44 ›› Issue (4): 1158-1165.DOI: 10.11772/j.issn.1001-9081.2023050566

• 网络空间安全 • 上一篇    

面向工控系统未知攻击的域迁移入侵检测方法

王昊冉, 于丹, 杨玉丽, 马垚, 陈永乐()   

  1. 太原理工大学 计算机科学与技术学院(大数据学院),太原 030000
  • 收稿日期:2023-05-09 修回日期:2023-07-28 接受日期:2023-07-31 发布日期:2023-08-03 出版日期:2024-04-10
  • 通讯作者: 陈永乐
  • 作者简介:王昊冉(1998—),男,山西临汾人,硕士研究生,CCF会员,主要研究方向:物联网安全
    于丹(1983—),女,山西太原人,讲师,博士,CCF会员,主要研究方向:物联网安全
    杨玉丽(1979—),女,山西临汾人,讲师,博士,CCF会员,主要研究方向:云安全、区块链
    马垚(1982—),男,山西太原人,讲师,博士,CCF会员,主要研究方向:物联网安全
    陈永乐(1983—),男,山东潍坊人,教授,博士,CCF会员,主要研究方向:物联网安全。chenyongle@tyut.edu.cn
  • 基金资助:
    山西省基础研究计划项目(20210302123131)

Domain transfer intrusion detection method for unknown attacks on industrial control systems

Haoran WANG, Dan YU, Yuli YANG, Yao MA, Yongle CHEN()   

  1. College of Computer Science and Technology (College of Data Science),Taiyuan University of Technology,Taiyuan Shanxi 030000,China
  • Received:2023-05-09 Revised:2023-07-28 Accepted:2023-07-31 Online:2023-08-03 Published:2024-04-10
  • Contact: Yongle CHEN
  • About author:WANG Haoran, born in 1998, M. S. candidate. His research interests include IoT security.
    YU Dan, born in 1983, Ph. D., lecturer. Her research interests include IoT security.
    YANG Yuli, born in 1979, Ph. D., lecturer. Her research interests include cloud security, blockchain.
    MA Yao, born in 1982, Ph. D., lecturer. His research interests include IoT security.
    CHEN Yongle, born in 1983, Ph. D., professor. His research interests include IoT security.
  • Supported by:
    Basic Research Program of Shanxi Province(20210302123131)

摘要:

针对工业控制系统(ICS)数据匮乏、工控入侵检测系统对未知攻击检测效果差的问题,提出一种基于生成对抗迁移学习网络的工控系统未知攻击入侵检测方法(GATL)。首先,引入因果推理和跨域特征映射关系对数据进行重构,提高数据的可理解性和可靠性;其次,由于源域和目标域数据不平衡,采用基于域混淆的条件生成对抗网络(GAN)增加目标域数据集的规模和多样性;最后,通过域对抗迁移学习融合数据的差异性、共性,提高工控入侵检测模型对目标域未知攻击的检测和泛化能力。实验结果表明,在工控网络标准数据集上,GATL在保持已知攻击高检测率的情况下,对目标域的未知攻击检测的F1-score平均为81.59%,相较于动态对抗适应网络(DAAN)和信息增强的对抗域自适应(IADA)方法分别提升了63.21和64.04个百分点。

关键词: 迁移学习, 工业控制系统, 未知攻击, 生成对抗网络, 混合注意力

Abstract:

Aiming at the problems of lack of Industrial Control System (ICS) data and poor detection of unknown attacks by industrial control intrusion detection systems, an unknown attack intrusion detection method for industrial control systems based on Generative Adversarial Transfer Learning network (GATL) was proposed. Firstly, causal inference and cross-domain feature mapping relations were introduced to reconstruct the data to improve its understandability and reliability. Secondly, due to the data imbalance between source domain and target domain, domain confusion-based conditional Generative Adversarial Network (GAN) was used to increase the size and diversity of the target domain dataset. Finally, the differences and commonalities of the data were fused through domain adversarial transfer learning to improve the detection and generalization capabilities of the industrial control intrusion detection model for unknown attacks in the target domain. The experimental results show that on the standard dataset of industrial control network, GATL has an average F1-score of 81.59% in detecting unknown attacks in the target domain while maintaining a high detection rate of known attacks, which is 63.21 and 64.04 percentage points higher than the average F1-score of Dynamic Adversarial Adaptation Network (DAAN) and Information-enhanced Adversarial Domain Adaptation (IADA) method, respectively.

Key words: transfer learning, Industrial Control System (ICS), unknown attack, Generative Adversarial Network (GAN), hybrid attention

中图分类号: