Abstract
As an important part of guard system, intrusion detection systems have great significance to the security of industrial control systems. Cause the industrial control systems of the on-site environment is often very complicated, the process data extracted on-site have a wide variety of features, and they always have complex associations and are not independent. The intrusion detection algorithms for traditional industrial control systems often do not solve this problem, which results in a decrease in the accuracy, precision and high false negative rate (FNR), false positives rate (FPR). Aiming at solving the current problems, this paper proposes an algorithm combining the Fast Independent Principal Component Analysis (FastICA) and Support Vector Machine (SVM). Finally compared with the SVM and PCA-SVM algorithms, the experimental results show that the accuracy rate has been significantly improved and slight FPR.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Shi, H., Shang, W., Chen, C., Zhao, J., Yin, L.: Key process Protection of High dimensional process data in complex production. Comput. Mater. Continua 645–658 (2019)
Jiang, J., Yasakethu, L.: Anomaly detection viaone class SVM for protection of SCADA systems. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 82–88 (2013).
Kim, G., Lee, S., Kim, S.: A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst. Appl. 41, 1690–1700 (2014)
Shang, W.L., Li, L., Wan, M.: Industrial communication intrusion detection algorithm based on improved one-class SVM. In: 2015World Congress on Industrial Control System Security, Londen, pp. 21–25 (2015)
Puyati, W., Walairacht, A.: Efficiency improvement for unconstrained face recognition by weightening probability values of modular PCA and wavelet PCA. In: 2008 10th International Conference on Advanced Communication Technology, Gangwon-Do, pp. 1449–1453 (2014)
Wei, T.: Asymptotic analysis of the generalized symmetric FastICA algorithm. In: 2014 IEEE Workshop on Statistical Signal Processing (SSP), Gold Coast, pp. 460–463 (2014)
Saideep, N., Kurup, D.G., Tripathi, S.: Detection of closely spaced sinusoids in noise using fastica algorithm. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 305–309 (2017)
Yang, Y., Wang, J., Yang, Y.: Industrial communication intrusion detection algorithm based on improved one-class SVM. In: 2015World Congress on Industrial Control System Security, pp. 21–25 (2015)
Puyati, W., Walairacht, A.: Improving SVM classifier with prior knowledge in microcalcification detection1. In: 2012 19th IEEE International Conference on Image Processing, pp. 2837–2840 (2012)
Peng, P., Ma, Q., Hong, L.: The research of the parallel SMO algorithm for solving SVM. In: 2009 International Conference on Machine Learning and Cybernetics, pp. 460–463 (2014)
Funding
This work is supported in part by “National Key R&D Program of China” (2019YFB2006300), Shenyang Science and Technology Development [2019] No. 66 (Z191001).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
The authors declare that they have no conflicts of interest to report regarding the present study.
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Chen, H., Liu, X., Wang, T., Zhang, X. (2021). Research on Intrusion Detection of Industrial Control System Based on FastICA-SVM Method. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12736. Springer, Cham. https://doi.org/10.1007/978-3-030-78609-0_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-78609-0_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78608-3
Online ISBN: 978-3-030-78609-0
eBook Packages: Computer ScienceComputer Science (R0)