IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v29y2020ics1874548220300214.html
   My bibliography  Save this article

Applying separately cost-sensitive learning and Fisher's discriminant analysis to address the class imbalance problem: A case study involving a virtual gas pipeline SCADA system

Author

Listed:
  • Choubineh, Abouzar
  • Wood, David A.
  • Choubineh, Zahak

Abstract

Critical infrastructure, including refineries, pipelines and power grids are routinely monitored by supervisory control and data acquisition (SCADA) systems. The information exchange and communication aspects of such systems and their connected networks make them prone to cyberattacks. Providing SCADA systems with robust security and rapid cyber-attack detection is therefore imperative. Automatic intrusion detection can be provided by some machine learning methods, in particular, classification algorithms. However, such algorithms commonly disregard the difference between various misclassification errors. The techniques of cost-sensitive learning and Fisher's (linear) discriminant analysis (FDA) are separately investigated to overcome class imbalance issues in SCADA system datasets using five different machine learning algorithms applied to a well-studied gas pipeline dataset. The results reveal that the cost-sensitive learning is able to increase the performance of all the algorithms evaluated, especially their true positive rate. On the other hand, the FDA method can favorably influence only the HoeffdingTree and OneR algorithms. This suggests that the FDA method is not as powerful as the cost-sensitive learning in addressing class imbalance issues.

Suggested Citation

  • Choubineh, Abouzar & Wood, David A. & Choubineh, Zahak, 2020. "Applying separately cost-sensitive learning and Fisher's discriminant analysis to address the class imbalance problem: A case study involving a virtual gas pipeline SCADA system," International Journal of Critical Infrastructure Protection, Elsevier, vol. 29(C).
  • Handle: RePEc:eee:ijocip:v:29:y:2020:i:c:s1874548220300214
    DOI: 10.1016/j.ijcip.2020.100357
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548220300214
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2020.100357?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Genge, Béla & Haller, Piroska & Kiss, István, 2016. "A framework for designing resilient distributed intrusion detection systems for critical infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 15(C), pages 3-11.
    2. Jie, Xinchun & Wang, Haikuan & Fei, Minrui & Du, Dajun & Sun, Qing & Yang, T.C., 2018. "Anomaly behavior detection and reliability assessment of control systems based on association rules," International Journal of Critical Infrastructure Protection, Elsevier, vol. 22(C), pages 90-99.
    3. Krishna Madhuri Paramkusem & Ramazan S. Aygun, 2018. "Classifying Categories of SCADA Attacks in a Big Data Framework," Annals of Data Science, Springer, vol. 5(3), pages 359-386, September.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Al-Daweri, Muataz Salam & Abdullah, Salwani & Ariffin, Khairul Akram Zainol, 2021. "A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem," International Journal of Critical Infrastructure Protection, Elsevier, vol. 34(C).
    2. Oyeniyi Akeem Alimi & Khmaies Ouahada & Adnan M. Abu-Mahfouz & Suvendi Rimer & Kuburat Oyeranti Adefemi Alimi, 2021. "A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification," Sustainability, MDPI, vol. 13(17), pages 1-19, August.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Antoine Boche & Clément Foucher & Luiz Fernando Lavado Villa, 2022. "Understanding Microgrid Sustainability: A Systemic and Comprehensive Review," Energies, MDPI, vol. 15(8), pages 1-29, April.
    2. Meng Xia & Dajun Du & Minrui Fei & Xue Li & Taicheng Yang, 2020. "A Novel Sparse Attack Vector Construction Method for False Data Injection in Smart Grids," Energies, MDPI, vol. 13(11), pages 1-19, June.
    3. Palleti, Venkata Reddy & Joseph, Jude Victor & Silva, Arlindo, 2018. "A contribution of axiomatic design principles to the analysis and impact of attacks on critical infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 23(C), pages 21-32.
    4. Al-Daweri, Muataz Salam & Abdullah, Salwani & Ariffin, Khairul Akram Zainol, 2021. "A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem," International Journal of Critical Infrastructure Protection, Elsevier, vol. 34(C).
    5. Haller, Piroska & Genge, Béla & Duka, Adrian-Vasile, 2019. "On the practical integration of anomaly detection techniques in industrial control applications," International Journal of Critical Infrastructure Protection, Elsevier, vol. 24(C), pages 48-68.
    6. Oyeniyi Akeem Alimi & Khmaies Ouahada & Adnan M. Abu-Mahfouz & Suvendi Rimer & Kuburat Oyeranti Adefemi Alimi, 2021. "A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification," Sustainability, MDPI, vol. 13(17), pages 1-19, August.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:29:y:2020:i:c:s1874548220300214. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.