<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Intrusion detection system on the basis of data mining algorithms in the industrial network</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>M A Gurin</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>A M Vulfin</string-name>
          <email>vulfin.alexey@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>V I Vasilyev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>A V Nikonov</string-name>
          <email>nikonovandrey1994@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ufa State Aviation Technical University</institution>
          ,
          <addr-line>K. Marks st., 12, Ufa, Russia, 450008</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2019</year>
      </pub-date>
      <fpage>553</fpage>
      <lpage>565</lpage>
      <abstract>
        <p>The purpose of the work is to increase the security of the industrial network of an automated process control system based on intelligent network traffic analysis algorithms. The analysis of the problem of detecting and recording actions of violators on the implementation of a network attack on an automated process control system in the industrial network of an enterprise has been performed. A structural and functional model of the monitoring system of the industrial network of industrial control systems is proposed. An algorithm is developed for the intellectual analysis of network traffic of industrial protocols and a software package that implements the proposed algorithms as part of a monitoring system to evaluate the effectiveness of the proposed solution on field data.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Security of the critical infrastructure of automated process control system (APCS) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] under the
conditions of the automation level of modern production in the Russian Federation and around the
world is becoming an increasingly priority task. The imperfection of the protection and vulnerability
of modern SCADA-systems (Supervisory Control and Data Acquisition systems) is due to a number of
features of the organization of such systems [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Special viruses and target attacks, sponsored by
terrorist groups or governments of competing countries, increasingly began to target at the industrial
production facilities [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3, 4, 5</xref>
        ]. The Internet of things gradually comes to the enterprises networks,
expanding the already extensive list of industrial protocols and forming the concept of an industrial
Internet of things (IIoT) [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ]. The means to ensure the information security of process control
systems at this stage of their development are not able to withstand such threats [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ].
      </p>
      <p>
        Today, there is a transition to automated digital production, controlled by intelligent systems in real
time, in constant interaction with the external environment, going beyond the boundaries of one
enterprise, with the prospect of combining into a global industrial network of things and services. This
approach is developed in the concept of “Industry 4.0” and describes the current trend in the
development of automation and data exchange, which includes cyber-physical systems, the Internet of
things and cloud computing [
        <xref ref-type="bibr" rid="ref10 ref8 ref9">8, 9, 10</xref>
        ]. There are many advantages of using wireless sensor networks
(WSN, Wireless sensor network) as an environment for wireless interaction of digital objects within
the industrial Internet of things network in various automated systems [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        Network security is becoming one of the main directions in the development of information
security through the use of a set of technical means [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Since any computer process control system
can be attacked, which usually results in serious technical, reputation and economic losses, it is
necessary to timely detect both known and previously unknown attacks in industrial networks. Attacks
of malicious persons are constantly improving, becoming combined and spread almost instantly.
Intrusion detection systems (IDS) implement monitoring functions and detect attacks that have
bypassed the firewall. IDS informs the administrator, who, in turn, takes a further decision on the
response to the attack [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>
        Thus, it can be concluded that the network attacks detection systems based on the use of artificial
intelligence methods as a key element of ensuring cybersecurity of the critical infrastructure [
        <xref ref-type="bibr" rid="ref13 ref14 ref15">13, 14,
15</xref>
        ] of the APCS in the concept of the development of the digital economy are of relevance and need
to be improved.
      </p>
      <p>
        The research goal is to increase the effectiveness of network attack detection system by using a
neural network analysis module as part of the IDS. To achieve this goal, it is necessary to solve the
following tasks:
• Analysis of the problem of detecting network attacks in industrial networks APCS.
• Development of the structure of the system for monitoring the industrial network of APCS;
• Development of algorithms for intellectual analysis of network traffic of industrial networks;
Development of a software package that implements the proposed algorithms as part of a monitoring
system, and an assessment of the effectiveness of the proposed solution on full-scale data.
2. Analysis of the problem of detecting network attacks in industrial networks
The process of automation of industrial production continues to evolve: the number of “intelligent”
terminal devices is increasing, the number of microcontroller-based computing systems involved in
the process control and process control is growing. Under these conditions, the role of data collected at
all levels of the process control system significantly increases. Requirements imposed by consumers of
this information are increasingly being tightened in terms of the volume, speed and reliability of data
acquisition, as well as information security of the entire system [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In turn, increasing degree of
automation of the enterprise functioning promoted the mutual integration of information (IT) and
socalled operational (OT) technologies [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>An industrial network is a data transmission environment that must meet a variety of diverse, often
contradictory requirements; a set of standard data exchange protocols that allow to link equipment
together (often from different manufacturers), and also to ensure interaction between the lower and
upper levels of the enterprise management system.</p>
      <p>In IIoT, the main types of “things” that need to be connected to the network are various types of
sensors and actuators. These devices, on the one hand, have an interface with a communication
network, and on the other hand, an interface that provides physical interaction with the process to be
monitored (Ethernet, Wi-Fi, cellular networks, Sigfox, LoRa, ZigBee, etc.).</p>
      <p>Not so long ago, the hierarchy of the APCS had a clear boundary between the levels. The trends of
recent years have made this structure much more complex and diffuse. The automated process control
system is more and more integrated with the automated control system, and through it inevitably
enters the sphere of Internet technologies. Unification of the corporate and industrial network of an
enterprise inevitably poses a serious problem of information security of the industrial network of
industrial control systems.</p>
      <p>
        The traditional process control system is a real-time system. To ensure error-free process control,
continuous process operation monitoring is necessary [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. If IT security methods are applied in the
process control system, in the event of possible data comprometation, the security system may limit
access to this data. This, in turn, can lead to loss of control over the TP and man-made or
environmental catastrophe (in critical infrastructure, petrochemical industry and other industries).
Therefore, in relation to industrial control systems, the inverse distribution of the significance of safety
aspects is widely used [
        <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
        ]:
• availability;
• integrity;
• confidentiality.
      </p>
    </sec>
    <sec id="sec-2">
      <title>Product name</title>
      <sec id="sec-2-1">
        <title>Meeting the</title>
        <p>requirements of
regulators
(FSTEC №31)</p>
      </sec>
      <sec id="sec-2-2">
        <title>Security audit</title>
      </sec>
      <sec id="sec-2-3">
        <title>Creating rules for the operation of technological processes</title>
      </sec>
      <sec id="sec-2-4">
        <title>Intgration with</title>
      </sec>
      <sec id="sec-2-5">
        <title>Human-Machine</title>
      </sec>
      <sec id="sec-2-6">
        <title>Interface (HMI)</title>
      </sec>
      <sec id="sec-2-7">
        <title>System distribution</title>
      </sec>
      <sec id="sec-2-8">
        <title>Recommendations for elimination</title>
        <p>+
+
+
+</p>
      </sec>
      <sec id="sec-2-9">
        <title>KICS for</title>
      </sec>
      <sec id="sec-2-10">
        <title>Nodes, KICS</title>
        <p>for Networks,</p>
      </sec>
      <sec id="sec-2-11">
        <title>Security Center</title>
        <p>
          +
The following main threats to the security of an industrial network can be identified [
          <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
          ]:
• Traditional virus software (malware);
• Targeted attacks;
• Unintentional staff errors;
• Suppliers of equipment and software, partners, contractors;
• extortion programs;
• Internal and external sabotage;
• Errors of specialized industrial control systems;
• Failure of hardware.
        </p>
        <p>Summary information of the information security systems of automated process control systems
shown in Table 1.</p>
      </sec>
      <sec id="sec-2-12">
        <title>Uses a copy of Uses copy of Uses copy of Data collection</title>
        <p>
          network traffic network network traffic without intervention,
Intervention in (SPAN / TAP), traffic (unidirectional integration with
technological but contains an (SPAN-ports) gateway) intrusion prevention
process intrusion system is possible
prevention
system
cSAeoPrftCtiwfSicaraetiodnevfeolroper (SEWWimeinimenCreCsCnoCsn, OA), - - Honeywell Experion
An example of the use of wireless sensor networks is the use of wireless sensor networks in
electrical substations [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. The compactness and autonomy of the sensor nodes make it possible to
install them in hard-to-reach places without solving the tasks of organizing wired communication
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Honeywell Risk Manager +</title>
      <sec id="sec-3-1">
        <title>A single control</title>
        <p>center that collects
information from
external monitoring
and security systems
channels for transmitting telemetric information such as: power flows in the power system, control of
active and reactive power, frequency and voltage in certain areas to the control room. Due to the
transition from wired to wireless network technologies to collect telemetry data, network security is
determined not only by hardware and software solutions for industrial controllers and sensor nodes,
but also by the chosen principles of their information interaction during the synthesis of network
topology, determination of routing parameters and data transmission.</p>
        <p>
          A wireless sensor network [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] consists of many autonomous sensor nodes distributed in areas of
the industrial system that are of interest for the collection of operational data and the joint transmission
of collected data over wireless channels to a central node that is a node or base station (BS).
        </p>
        <p>
          Most information security threats in wireless networks are similar to threats and attacks on wired
networks, except that wireless networks are harder to protect due to the use of an open medium as a
data transmission channel and the broadcast nature of wireless connections. Network protection is
complicated due to limited resources: the energy of an autonomous power source and computing
resources. Such limiting characteristics make traditional security measures, for example, the use of
complex encryption algorithms, multifactor authentication, firewalls, etc. [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ] – not always sufficient.
A significant factor is the time delay requirements for data transmission in the transport environment
and closed protocols for the operation of the software and hardware of the APCS, which do not always
allow the implementation of protection technologies using IPSec, SSL, VPN.
        </p>
        <p>The current trend in the development of the transport environment of industrial networks is the use
of self-organizing wireless networks with equal rights of nodes, a dynamically changing topology, the
possibility of reconfiguration, self-healing, dynamic routing, etc.</p>
        <p>
          The classification of attacks on wireless sensor networks in the direction of impact is given in [
          <xref ref-type="bibr" rid="ref24 ref25 ref26">24,
25, 26</xref>
          ].
        </p>
        <p>
          Active attacks are various modifications of data during communication by unauthorized persons.
Of most interest are routing attacks implemented at the network level. The most common attacks are
presented in [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>
          Wireless Intrusion Detection System – WIDS [
          <xref ref-type="bibr" rid="ref27 ref28 ref29">27, 28, 29</xref>
          ] is a software and hardware solution that
includes software agents that perform the function of collecting, processing and analyzing network
traffic packets. Agents interact with the server, transmit intercepted packets to it. The server processes
the received data to detect attack signatures and detect abnormal behavior of network nodes, and also
responds to events.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>3. Network attack detection methods</title>
      <p>
        There are two groups of methods: learning with a teacher (supervised) showed in Table 2, and
uncontrolled learning (without a teacher) showed in Table 3 [
        <xref ref-type="bibr" rid="ref30 ref35 ref36">30, 35, 36</xref>
        ]. The essential difference
between them is the fact that learning with a teacher uses a fixed sequence of assessment parameters
and some data on the meaning of assessment parameters. In learning without a teacher, the set of
assessment parameters changes and the process of further training is continuous. Table 4 describes
supervised learning methods for intrusion detections.
      </p>
    </sec>
    <sec id="sec-5">
      <title>Method</title>
      <sec id="sec-5-1">
        <title>Rule modeling</title>
      </sec>
      <sec id="sec-5-2">
        <title>Descriptive statistics</title>
      </sec>
      <sec id="sec-5-3">
        <title>Neural networks Table 2. Network attack detection: supervised learning [30].</title>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Method</title>
      <sec id="sec-6-1">
        <title>Simulation of</title>
        <p>multiple states</p>
      </sec>
      <sec id="sec-6-2">
        <title>Descriptive statistics</title>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Method</title>
      <sec id="sec-7-1">
        <title>States modelling</title>
      </sec>
      <sec id="sec-7-2">
        <title>Expert systems</title>
      </sec>
      <sec id="sec-7-3">
        <title>Rules modelling</title>
      </sec>
      <sec id="sec-7-4">
        <title>Parsing Table 3. Network attack detection: learning without a teacher [30].</title>
        <p>4. Development of the structure of the system for monitoring the industrial network of APCS
Figure 1 shows network structure of an enterprise with tools for collecting and analyzing network
traffic of a network intrusion detection system (IDS).</p>
        <p>The structure of the network attack detection system based on data mining is shown in the Figure 2.
At the first stage, network traffic is captured. In Figure 1, the numbers indicate the following
components: 1 is a router as a means of collecting incoming / outgoing network traffic, 2 is a router as
a means of collecting traffic within the enterprise network. The collection of necessary data is
performed using the package sniffer.</p>
        <sec id="sec-7-4-1">
          <title>Control level</title>
        </sec>
        <sec id="sec-7-4-2">
          <title>HMI SCADA/</title>
          <p>DCS
OPC-client</p>
        </sec>
        <sec id="sec-7-4-3">
          <title>HMI SCADA/</title>
          <p>DCS
OPC-client</p>
        </sec>
        <sec id="sec-7-4-4">
          <title>HMI SCADA/</title>
          <p>DCS
OPC-client</p>
        </sec>
        <sec id="sec-7-4-5">
          <title>Field level</title>
          <p>PLC</p>
          <p>PLC</p>
          <p>PLC</p>
          <p>PLC</p>
          <p>Sensors and actuators</p>
          <p>The second stage identifies the most significant parameters that characterize network activity.
ERP/MES
level</p>
          <p>DMZ</p>
          <p>WEB
services</p>
          <p>IPS/IDS
DMZ
DB and data
collection</p>
          <p>Internet
1
2</p>
          <p>DB
Application</p>
          <p>server
AD</p>
          <p>File
Server</p>
          <p>Department
network</p>
          <p>Department</p>
          <p>network</p>
          <p>LAN of control level
Industrial network</p>
          <p>At the third stage, detection and classification of attacks is carried out. The results of this
recognition are transmitted to related systems for reporting and visualization, depending on the
capabilities and specifics of adjacent systems. In addition, information about the attack on the APCS is
added to a special archive designed to investigate cybersecurity incidents by authorized specialists and
managers.
5. Development of algorithms for intellectual analysis of network traffic of industrial networks
An effective network attack detection system based on artificial intelligence methods can be built only
with a high-quality dataset of training and test samples that simulates various intrusions.</p>
          <p>
            KDDCUP99 – intrusion detection dataset based on the data set DARPA 98, is one of the only
publicly available labeled data set [
            <xref ref-type="bibr" rid="ref31">31</xref>
            ]. Dataset NSL-KDD proposed to improve KDD dataset. This
dataset has the following advantages over the KDD dataset:
• it does not include redundant entries in the training set, therefore classifiers will not be retrained
due to the frequency of such entries;
• there are no duplicate entries in the proposed test suites;
• number of records in the training and test sets is optimal, which makes it possible to conduct
experiments on the full set.
          </p>
          <p>Each entry has 41 attributes describing the various functions of the connection, and the label
assigned to each of them: attack or normal connection.</p>
          <p>
            Dataset UNSW-NB15 [
            <xref ref-type="bibr" rid="ref32">32</xref>
            ] contains data of normal traffic in modern networks and network traffic
of synthesized networks.
          </p>
          <p>Internet
Gateway for capturing
incoming network traffic</p>
          <p>Local computing</p>
          <p>network
network traffic capture</p>
          <p>node
Module for collecting
and primary filtering of
network traffic (forming
a dump of a captured
set of Ethernet frames)</p>
          <p>Dump of
analyzed
traffic</p>
          <p>Module for
extracting
signatures by the
protocols of OSI
model levels
decrypted TCP/IP stack
hierarchy protocol packets
network traffic
parser according
to the protocols of
OSI model levels
(extraction and
decoding packets
of higher levels</p>
          <p>protocols)
decrypted TCP/IP
stack hierarchy
protocol packets for
correlation with the
dump of accumulated</p>
          <p>Ethernet traffic</p>
        </sec>
        <sec id="sec-7-4-6">
          <title>Signature analysis system</title>
          <p>extracted
signatures</p>
          <p>Aatack
signatures</p>
          <p>Signature
analysis module</p>
          <p>TCP/IP stack packets
marked with attack type
data for
of thaetdrNadiiNtnioinmngaoldule Modulepfroimriadreyntifying</p>
          <p>characteristics of
typical traffic patterns
database of
network attacks</p>
          <p>signs
Decision about the
presence and type of Output NN vector
attack
primary signs of marked traffic
Module for identifying
significant features</p>
          <p>using PCA
Primary component vector</p>
          <p>Neural network
clasifier
e
l
u
d
o
m
k
r
o
w
t
e
n
l
a
r
u
e</p>
          <p>N</p>
          <p>
            Each entry in this set contains attributes that describe the various functions of the connection, and
the label assigned to each of them: attack or normal connection [
            <xref ref-type="bibr" rid="ref32">32</xref>
            ].
          </p>
          <p>The comparative table (Table 5) of the NSL-KDD and UNSW-NB15 methods is shown below:</p>
        </sec>
      </sec>
      <sec id="sec-7-5">
        <title>Dataset UNSW-NB15 is selected for use in the system:</title>
        <p>• number of classes of attacks is more than 2 times;
• test stand contained 33 subnets (NSL-KDD – 2 subnets);
• when collecting traffic on the network, 45 IP addresses participated in the exchange of
information against 11 in NSL-KDD;
• traffic was collected by several means (in NSL-KDD - Bro-IDS);
• UNSW-NB15 set contains more attributes for the record (49 vs. 42 in NSL-KDD).</p>
        <p>At the moment, in relation to industrial networks the following types of network attacks can be
distinguished (Table 6).</p>
        <p>Of all types of attacks implemented in the industrial network, network attack detection systems are
able to most effectively cope with network intelligence, DoS attacks, as well as various types of
injections and buffer overflow attacks. IDS is a practically universal tool capable of detecting most
types of attacks implemented on an industrial network.</p>
        <p>Main steps of the network traffic analysis algorithm in the industrial network are presented in the
Table 7.</p>
        <p>Analysis stage
Extract traffic
Feature selection
Classification
6. Development of a software package that implements the proposed algorithms as part of a
monitoring system
Table 8 presents the parameters of two common data sets used to build and test network attack
detection systems. The choice is made in favor of the UNSW-NB15 data set.</p>
        <p>Protocol</p>
        <p>Label
Unique
adresses</p>
        <p>Analysis stage
Duration of data collection</p>
        <p>Amount of threads
Number of bytes of packet sender
Number of bytes of packet recipient</p>
        <p>Number of sender packets
Number of recipient packets</p>
        <p>TCP
UDP
ICMP
Other
Normal
Attack</p>
        <p>Sender
Recipient</p>
        <p>When pre-processing the parameters of the selected data set UNSW-NB15, the attack classes
containing less than 5000 examples are excluded from the training set (Table 9).</p>
        <p>Categorical variables are coded into numeric ones. The entire data set is divided into a training and
test sample in the ratio of 75% to 25%.</p>
        <p>
          In order to compare the effectiveness of the use the classifier for a specific task, it is necessary to
compare the learning results of these classifiers on real data sets. To quantify the classifiers, the
following coefficients are applied [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ]:
        </p>
      </sec>
      <sec id="sec-7-6">
        <title>1) False Positive Rate – FPR;</title>
      </sec>
      <sec id="sec-7-7">
        <title>2) True Positive Rate – TPR;</title>
      </sec>
      <sec id="sec-7-8">
        <title>3) Sensitivity;</title>
      </sec>
      <sec id="sec-7-9">
        <title>4) Specificity;</title>
      </sec>
      <sec id="sec-7-10">
        <title>5) Proportion of correctly recognized examples – Correct Rate. The sensitivity of the algorithm is equal to the proportion of false positive classifications FPR (a, X). Sen = FPR (a, X)</title>
        <p>A sensitive diagnostic test is called overdiagnosis – the maximum prevention of missing malicious
code.</p>
        <p>Classifier
Decision Trees
Committee (RFT)
Multilayer
perceptron (MLP)
Decision Trees
Committee (RFT) +
main component
method for feature
selection
Classifier based on
k-nearest neighbors
Multilayer
perceptron +
Autoencoder</p>
        <p>The number of neurons in the hidden layer was selected during training to
achieve the minimum error on the test sample, the activation function of the
hidden layer neurons is the hyperbolic tangent;
The number of 5000 epochs of learning, the learning algorithm is conjugate
gradients.</p>
        <p>Before the classification, features are selected by the method of principal
components. The maximum number of nodes of the decision tree is assumed to
be 100. The results of the work of the “decision trees” method using feature
selection by the principal component method on the test sample are presented in
Table 12.</p>
        <p>The maximum number of nodes in the decision tree is assumed to be 250. The
results of the “decision trees” method are presented in table 11.</p>
        <p>Parameter k was hit to achieve optimal error on the test sample.</p>
        <p>∈ [5; 100]
Before making a classification, features are selected using a two-layer neural
network autoencoder</p>
      </sec>
      <sec id="sec-7-11">
        <title>A specific diagnostic test only diagnoses for certain traffic related to network attacks.</title>
        <p>In the course of the research, a series of experiments were carried out, the essence of which
consists in determining the presence of an attack and attributing it to a specific class (Table 10).</p>
        <p>When using the “decision trees” method together with the principal component method for
decreasing the dimension, the indicators decrease (sensitivity - by 8%, specificity - by 6.6%, the
proportion of correctly recognized examples - by 8.5%), and require more time and computational
resources.</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>7. Conclusion</title>
      <sec id="sec-8-1">
        <title>During the research the following tasks were solved: 1) The main security threats and the types of intruders in the industrial network of the enterprise are considered. A comparative analysis of software systems to ensure the safety of automated</title>
        <p>process control systems was conducted: Kaspersky Industrial CyberSecurity, Silent Defense,
PT Industrial Security Incidents Manager, Honeywell Risk Manager.
2) A structural scheme of a network attack detection system based on data mining techniques has
been developed.
3) Analyzed the data sets of network traffic, suitable for modeling the traffic of the industrial
network of enterprises: KDD99 CUP, NSL-KDD, UNSW-NB15 for the task of detecting
network attacks. The UNSW-NB15 set is selected for use in the system, since the number of
attack classes is twice as large; test stand contained 33 subnets (NSL-KDD – 2 subnets); in
collecting traffic on the network, 45 IP addresses participated in the exchange of information
against 11 in NSL-KDD; traffic collection was carried out by several means (in NSL-KDD –
Bro-IDS); the UNSW-NB15 set contains more attributes in the record (49 vs. 42 in
NSLKDD).
4) A software package has been developed that implements a comparative analysis of network
attack detection algorithms. The most effective is the “decision trees” method with sensitivity
indicators Sen = 1, specificity Spe = 0.9877, and the mean correct rate MCR = 89.67%.</p>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>Acknowledgments</title>
      <p>This work was supported by the Russian Foundation for Basic Research, research №17-48-020095.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Knapp</surname>
            <given-names>E D</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Langill J T 2014 Industrial Network</surname>
          </string-name>
          <article-title>Security: Securing critical infrastructure networks for smart grid</article-title>
          ,
          <source>SCADA, and other Industrial Control Systems Syngress</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Ralston</surname>
            <given-names>P A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Graham J H and Hieb J L 2007</surname>
          </string-name>
          <article-title>Cyber security risk assessment for SCADA and DCS networks ISA transactions 46(4</article-title>
          )
          <fpage>583</fpage>
          -
          <lpage>594</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Montgomery</surname>
            <given-names>G SCADA</given-names>
          </string-name>
          :
          <article-title>Threat landscape URL: https://energy</article-title>
          .gov/sites/prod/files/cioprod/ documents/Cracking_Down_SCADA_Security_- _
          <string-name>
            <surname>Garrett</surname>
          </string-name>
          _Montgomery.pdf
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Langner R To kill</surname>
          </string-name>
          <article-title>a centrifuge - a technical analysis of what Stuxnet's creators tried to achieve URL: http://www</article-title>
          .langner.com/en/wp-content/uploads/2013/11/To- kill
          <article-title>-a-centrifuge</article-title>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Alert</given-names>
            <surname>IR-ALERT-H-</surname>
          </string-name>
          16-056-01
          <string-name>
            <surname>Cyber-Attack Against Ukrainian Critical Infrastructure</surname>
            <given-names>URL</given-names>
          </string-name>
          : https://ics-cert.
          <article-title>us-cert.gov/alerts/IR-</article-title>
          <string-name>
            <surname>ALERT-H-</surname>
          </string-name>
          16-056-01
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Ginter</surname>
            <given-names>A 2016</given-names>
          </string-name>
          <string-name>
            <surname>SCADA</surname>
          </string-name>
          <article-title>Security</article-title>
          .
          <article-title>What's broken and how to fix it (Abterra Technologies</article-title>
          ) p
          <fpage>165</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Steenstrup</surname>
            <given-names>K IT</given-names>
          </string-name>
          and
          <string-name>
            <surname>Operational Technology Alignment Innovation Key Initiative Overview</surname>
            <given-names>URL</given-names>
          </string-name>
          : https://www.gartner.com/doc/2691517/it-operational
          <string-name>
            <surname>-</surname>
          </string-name>
          technology
          <string-name>
            <surname>-</surname>
          </string-name>
          alignment-innovation #
          <fpage>a</fpage>
          -
          <lpage>98481934</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Greengard</surname>
            <given-names>S 2015</given-names>
          </string-name>
          <article-title>The internet of things</article-title>
          (MIT Press) p
          <fpage>232</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Zaramenskih</surname>
            <given-names>E</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Artemev</surname>
            <given-names>I</given-names>
          </string-name>
          2017 Internet of Things. Research and
          <string-name>
            <surname>scope (Infra-M Publisher</surname>
          </string-name>
          ) p
          <fpage>188</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Roth</surname>
            <given-names>A 2016</given-names>
          </string-name>
          <article-title>Einführung und Umsetzung von Industrie 4.0</article-title>
          .
          <string-name>
            <surname>Grundlagen</surname>
          </string-name>
          , Vorgehensmodell und Use Cases aus der Praxis (Springer Gabler Verlag, Wiesbaden) p
          <fpage>272</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Almomani</surname>
            <given-names>I</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Al-Kasasbeh</surname>
            <given-names>B</given-names>
          </string-name>
          and
          <string-name>
            <surname>Al-Akhras</surname>
            <given-names>M 2016</given-names>
          </string-name>
          <article-title>WSN-DS: a dataset for intrusion detection systems in wireless sensor networks</article-title>
          <source>Journal of Sensors</source>
          <year>2016</year>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Karnouskos</surname>
            <given-names>S 2012</given-names>
          </string-name>
          <article-title>A SOA-based architecture for empowering future collaborative cloud-based industrial automation 38th</article-title>
          <source>Annual Conference on IEEE Industrial Electronics Society 5766- 5772</source>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Yan</surname>
            <given-names>Y</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qian</surname>
            <given-names>Y</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharif</surname>
            <given-names>H</given-names>
          </string-name>
          , and
          <article-title>Tipper D 2012 A survey on smart grid communication infrastructures: Motivations, requirements and challenges IEEE communications surveys</article-title>
          &amp; tutorials
          <volume>15</volume>
          (
          <issue>1</issue>
          )
          <fpage>5</fpage>
          -
          <lpage>20</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Maglaras</surname>
            <given-names>L A</given-names>
          </string-name>
          <year>2018</year>
          <article-title>Cyber security of critical infrastructures ICT Express 4</article-title>
          (
          <issue>1</issue>
          )
          <fpage>42</fpage>
          -
          <lpage>45</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Sun</surname>
            <given-names>C C</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hahn</surname>
            <given-names>A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Liu C C 2018</surname>
          </string-name>
          <article-title>Cyber security of a power grid: State-of-the-</article-title>
          art
          <source>International Journal of Electrical Power &amp; Energy Systems</source>
          <volume>99</volume>
          <fpage>45</fpage>
          -
          <lpage>56</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Meltzer</surname>
            <given-names>D</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lund J Industrial Cyber</surname>
          </string-name>
          <article-title>Security for dummies URL</article-title>
          : http://www.vectorinfotech.com/ assets/files/Industrial-Cyber-
          <article-title>Security-for-dummies</article-title>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Kaspersky</given-names>
            <surname>Industrial CyberSecurity</surname>
          </string-name>
          <string-name>
            <surname>URL</surname>
          </string-name>
          : https://ics.kaspersky.ru/
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Kaspersky</given-names>
            <surname>Industrial Cybersecurity</surname>
          </string-name>
          <string-name>
            <surname>URL</surname>
          </string-name>
          : https://softprom.com/sites/default/files/materials /KICS_rus_0816.pdf
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>Positive</given-names>
            <surname>Technologies Industrial Security Incident Manager</surname>
          </string-name>
          <string-name>
            <surname>URL</surname>
          </string-name>
          : https://www.ptsecurity.com /ru-ru/products/isim/
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Security</given-names>
            <surname>Matters SilentDefense</surname>
          </string-name>
          <string-name>
            <surname>URL</surname>
          </string-name>
          : https://www.secmatters.com/product
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>SilentDefense datasheet</surname>
            <given-names>URL</given-names>
          </string-name>
          : https://www.secmatters.com/hubfs/Security_Matters-March
          <year>2017</year>
          /PDF/SilentDefense-Datasheet.pdf
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Yick</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mukherjee</surname>
            <given-names>B</given-names>
          </string-name>
          and
          <string-name>
            <surname>Ghosal D 2008</surname>
          </string-name>
          <article-title>Wireless sensor network survey Computer networks 12(</article-title>
          <year>52</year>
          )
          <fpage>2292</fpage>
          -
          <lpage>2330</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Pathan A S K</surname>
            ,
            <given-names>Lee H W and Hong C S</given-names>
          </string-name>
          <article-title>2006 Security in wireless sensor networks: issues and challenges 8th</article-title>
          <source>International Conference Advanced Communication Technology (ICACT) 2</source>
          <volume>1043</volume>
          -
          <fpage>1048</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Chelli</surname>
            <given-names>K 2015</given-names>
          </string-name>
          <article-title>Security issues in wireless sensor networks: Attacks and countermeasures</article-title>
          <source>Proceedings of the World Congress on Engineering (London</source>
          , UK)
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Loo</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mauri J L and Ortiz J H 2016</surname>
          </string-name>
          <article-title>Mobile ad hoc networks: current status and future trends</article-title>
          (CRC Press) p
          <fpage>538</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Sinha</surname>
            <given-names>P 2017</given-names>
          </string-name>
          <article-title>Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey IEEE International Conference on Signal Processing and Communication (ICSPC) (Coimbatore, Tamil Nadu</article-title>
          , India)
          <fpage>288</fpage>
          -
          <lpage>293</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Can</surname>
            <given-names>O</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sahingoz O K 2015</surname>
          </string-name>
          <article-title>A survey of intrusion detection systems in wireless sensor networks 6th</article-title>
          <source>International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO)</source>
          (Istanbul, Turkey)
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Al-Dabbagh</surname>
            <given-names>A W</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            <given-names>Y</given-names>
          </string-name>
          and
          <string-name>
            <surname>Chen</surname>
            <given-names>T 2018</given-names>
          </string-name>
          <article-title>An intrusion detection system for cyber attacks in wireless networked control systems</article-title>
          <source>IEEE Transactions on Circuits and Systems II: Express Briefs</source>
          <volume>8</volume>
          (
          <issue>65</issue>
          )
          <fpage>1049</fpage>
          -
          <lpage>1053</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Almomani</surname>
          </string-name>
          and
          <string-name>
            <surname>Al-Kasasbeh</surname>
            <given-names>B</given-names>
          </string-name>
          2015
          <article-title>Performance analysis of LEACH protocol under Denial of Service attacks Proceedings of the 6th IEEE International Conference on Information and Communication Systems (ICICS) (Amman</article-title>
          , Jordan)
          <fpage>292</fpage>
          -
          <lpage>297</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Kornienko</surname>
            <given-names>A A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Slyusarenko I M Intrusion</surname>
          </string-name>
          <article-title>Detection Systems and Methods: Current State and Areas for Improvement URL</article-title>
          : http://citforum.ru/security/internet/ids_overview/
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Kashyap</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Agrawal</surname>
            <given-names>P</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pandey</surname>
            <given-names>V S</given-names>
          </string-name>
          and
          <string-name>
            <surname>Keshri S P 2013 Soft Computing</surname>
          </string-name>
          <article-title>Based Classification Technique Using KDD 99 Data Set for Intrusion Detection System Int</article-title>
          .
          <source>J. Advanced Research in Electrical, Electronics and Instrumentation Engineering</source>
          <volume>2</volume>
          (
          <issue>2</issue>
          )
          <fpage>1398</fpage>
          -
          <lpage>1405</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Moustafa</surname>
            <given-names>N</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Slay</surname>
            <given-names>J</given-names>
          </string-name>
          2015
          <string-name>
            <surname>UNSW-</surname>
          </string-name>
          <article-title>NB15: a comprehensive data set for network intrusion detection system (UNSW-NB15 network data set) Military Communications</article-title>
          and
          <string-name>
            <surname>Information Systems Conference (MilCIS) (Canberra</surname>
          </string-name>
          , Australia)
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <surname>Perrin C The CIA Triad</surname>
            <given-names>URL</given-names>
          </string-name>
          : https://www.techrepublic.com/blog/it- security/the-cia-triad/
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Easton</surname>
            <given-names>V J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McColl J H Hypothesis testing</surname>
            <given-names>URL</given-names>
          </string-name>
          : http://www.stats.gla.ac.uk/steps/ glossary/hypothesis_testing.html
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <surname>Branitskiy</surname>
            <given-names>A A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kotenko</surname>
            <given-names>I V</given-names>
          </string-name>
          <year>2016</year>
          <article-title>Analysis and classification of network attack detection methods</article-title>
          <source>Proc. SPIIRAN</source>
          <volume>2</volume>
          (
          <issue>45</issue>
          )
          <fpage>207</fpage>
          -
          <lpage>44</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <surname>Katasev</surname>
            <given-names>A S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kataseva</surname>
            <given-names>D V</given-names>
          </string-name>
          and
          <string-name>
            <surname>Kirpichnikov A P 2015</surname>
          </string-name>
          <article-title>Neural network diagnostics of abnormal network activity</article-title>
          <source>Bulletin of Kazan Technological University</source>
          <volume>18</volume>
          (
          <issue>6</issue>
          )
          <fpage>163</fpage>
          -
          <lpage>167</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>