IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v47y2024ics1874548224000593.html
   My bibliography  Save this article

An AutoML-based security defender for industrial control systems

Author

Listed:
  • Vasan, Danish
  • Alqahtani, Ebtesam Jubran S.
  • Hammoudeh, Mohammad
  • Ahmed, Adel F.

Abstract

Securing Industrial Control Systems (ICS) against cyber threats is crucial for maintaining operational reliability and safety in critical infrastructure. Traditional Machine Learning (ML) approaches in ICS development require substantial domain expertise, posing challenges for non-experts. To address this gap, we propose and evaluate ICS-defender, a defense mechanism to enhance ICS security through Automated Machine Learning (AutoML) techniques. Our approach leverages sophisticated feature engineering and AutoML to automate model selection, training, aggregation, and optimization, thereby reducing the dependency on specialized knowledge. We evaluate ICS-defender against state-of-the-art AutoML frameworks using diverse datasets from power systems and electric vehicle chargers. Experimental results consistently demonstrate that ICS-defender outperforms existing frameworks in terms of accuracy and robustness, achieving average accuracies of 93.75%, 94.34%, and 87.12% for power systems attacks datasets and 94.23% for the electric vehicle charging station attacks dataset, surpassing baseline algorithms. This research contributes to advancing secure and resilient ICS, offering significant implications for broader applications and future enhancements in industrial cybersecurity.

Suggested Citation

  • Vasan, Danish & Alqahtani, Ebtesam Jubran S. & Hammoudeh, Mohammad & Ahmed, Adel F., 2024. "An AutoML-based security defender for industrial control systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 47(C).
  • Handle: RePEc:eee:ijocip:v:47:y:2024:i:c:s1874548224000593
    DOI: 10.1016/j.ijcip.2024.100718
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548224000593
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2024.100718?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Miller, Thomas & Staves, Alexander & Maesschalck, Sam & Sturdee, Miriam & Green, Benjamin, 2021. "Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    2. Fazel Mohammadi, 2021. "Emerging Challenges in Smart Grid Cybersecurity Enhancement: A Review," Energies, MDPI, vol. 14(5), pages 1-9, March.
    3. Nakkeeran Murugesan & Anantha Narayanan Velu & Bagavathi Sivakumar Palaniappan & Balamurugan Sukumar & Md. Jahangir Hossain, 2024. "Mitigating Missing Rate and Early Cyberattack Discrimination Using Optimal Statistical Approach with Machine Learning Techniques in a Smart Grid," Energies, MDPI, vol. 17(8), pages 1-34, April.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Davide Berardi & Franco Callegati & Andrea Giovine & Andrea Melis & Marco Prandini & Lorenzo Rinieri, 2023. "When Operation Technology Meets Information Technology: Challenges and Opportunities," Future Internet, MDPI, vol. 15(3), pages 1-16, February.
    2. Ersen Akdeniz & Mustafa Bagriyanik, 2023. "A Preventive Control Approach for Power System Vulnerability Assessment and Predictive Stability Evaluation," Sustainability, MDPI, vol. 15(8), pages 1-19, April.
    3. Rahman, Ayesha & Mustafa, Ghulam & Khan, Abdul Qayyum & Abid, Muhammad & Durad, Muhammad Hanif, 2022. "Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms," International Journal of Critical Infrastructure Protection, Elsevier, vol. 39(C).
    4. Barbara Wyrzykowska & Hubert Szczepaniuk & Edyta Karolina Szczepaniuk & Anna Rytko & Marzena Kacprzak, 2024. "Intelligent Energy Management Systems in Industry 5.0: Cybersecurity Applications in Examples," Energies, MDPI, vol. 17(23), pages 1-22, November.
    5. Wang, Wei & Cova, Gregorio & Zio, Enrico, 2022. "A clustering-based framework for searching vulnerabilities in the operation dynamics of Cyber-Physical Energy Systems," Reliability Engineering and System Safety, Elsevier, vol. 222(C).
    6. Mitra, Somalee & Chakraborty, Basab & Mitra, Pabitra, 2024. "Smart meter data analytics applications for secure, reliable and robust grid system: Survey and future directions," Energy, Elsevier, vol. 289(C).
    7. Omid Sadeghian & Behnam Mohammadi-Ivatloo & Fazel Mohammadi & Zulkurnain Abdul-Malek, 2022. "Protecting Power Transmission Systems against Intelligent Physical Attacks: A Critical Systematic Review," Sustainability, MDPI, vol. 14(19), pages 1-24, September.
    8. Rikin Tailor & Zsolt Čonka & Michal Kolcun & Ľubomír Beňa, 2021. "Electrical Energy Flow Algorithm for Household, Street and Battery Charging in Smart Street Development," Energies, MDPI, vol. 14(13), pages 1-34, June.
    9. Cozza, Vittoria & Dalla Preda, Mila & Lanotte, Ruggero & Lucchese, Marco & Merro, Massimo & Zannone, Nicola, 2024. "Obfuscation strategies for industrial control systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 47(C).
    10. Nazir, Lubna & Sharifi, Ayyoob, 2024. "An analysis of barriers to the implementation of smart grid technology in Pakistan," Renewable Energy, Elsevier, vol. 220(C).
    11. Berghout, Tarek & Benbouzid, Mohamed, 2022. "EL-NAHL: Exploring labels autoencoding in augmented hidden layers of feedforward neural networks for cybersecurity in smart grids," Reliability Engineering and System Safety, Elsevier, vol. 226(C).
    12. e Sousa, Álan & Messai, Nadhir & Manamanni, Noureddine, 2022. "Load-altering attack detection on smart grid using functional observers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 37(C).
    13. Wu, Ying & Wu, Yanpeng & Cimen, Halil & Vasquez, Juan C. & Guerrero, Josep M., 2022. "Towards collective energy Community: Potential roles of microgrid and blockchain to go beyond P2P energy trading," Applied Energy, Elsevier, vol. 314(C).
    14. Vijayshankar, Sanjana & Chang, Chin-Yao & Utkarsh, Kumar & Wald, Dylan & Ding, Fei & Balamurugan, Sivasathya Pradha & King, Jennifer & Macwan, Richard, 2023. "Assessing the impact of cybersecurity attacks on energy systems," Applied Energy, Elsevier, vol. 345(C).
    15. Etxezarreta, Xabier & Garitano, Iñaki & Iturbe, Mikel & Zurutuza, Urko, 2023. "Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey," International Journal of Critical Infrastructure Protection, Elsevier, vol. 42(C).
    16. Smitha Joyce Pinto & Pierluigi Siano & Mimmo Parente, 2023. "Review of Cybersecurity Analysis in Smart Distribution Systems and Future Directions for Using Unsupervised Learning Methods for Cyber Detection," Energies, MDPI, vol. 16(4), pages 1-24, February.
    17. Muhammad Fakhrul Safitra & Muharman Lubis & Hanif Fakhrurroja, 2023. "Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity," Sustainability, MDPI, vol. 15(18), pages 1-32, September.
    18. Muhammad Awais Shahid & Fiaz Ahmad & Fahad R. Albogamy & Ghulam Hafeez & Zahid Ullah, 2022. "Detection and Prevention of False Data Injection Attacks in the Measurement Infrastructure of Smart Grids," Sustainability, MDPI, vol. 14(11), pages 1-25, May.
    19. Jorge C. Merlino & Mohammed Asiri & Neetesh Saxena, 2022. "DDoS Cyber-Incident Detection in Smart Grids," Sustainability, MDPI, vol. 14(5), pages 1-18, February.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:47:y:2024:i:c:s1874548224000593. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.