College of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China.
Automation Engineering Institute, Beijing Polytechnic, Beijing 100176, China.
Sensors (Basel). 2020 Jul 8;20(14):3817. doi: 10.3390/s20143817.
Intrusion detection is only the initial part of the security system for an industrial control system. Because of the criticality of the industrial control system, professionals still make the most important security decisions. Therefore, a simple intrusion alarm has a very limited role in the security system, and intrusion detection models based on deep learning struggle to provide more information because of the lack of explanation. This limits the application of deep learning methods to industrial control network intrusion detection. We analyzed the deep neural network (DNN) model and the interpretable classification model from the perspective of information, and clarified the correlation between the calculation process of the DNN model and the classification process. By comparing the normal samples with the abnormal samples, the abnormalities that occur during the calculation of the DNN model compared to the normal samples could be found. Based on this, a layer-wise relevance propagation method was designed to map the abnormalities in the calculation process to the abnormalities of attributes. At the same time, considering that the data set may already contain some useful information, we designed filtering rules for a kind of data set that can be obtained at a low cost, so that the calculation result is presented in a more accurate manner, which should help professionals lock and address intrusion threats more quickly.
入侵检测只是工控系统安全系统的初始部分。由于工控系统的关键性,专业人员仍然做出最重要的安全决策。因此,简单的入侵报警在安全系统中的作用非常有限,而基于深度学习的入侵检测模型由于缺乏解释而难以提供更多信息。这限制了深度学习方法在工业控制网络入侵检测中的应用。我们从信息的角度分析了深度神经网络(DNN)模型和可解释分类模型,并阐明了 DNN 模型的计算过程与分类过程之间的相关性。通过将正常样本与异常样本进行比较,可以找到 DNN 模型在计算过程中与正常样本相比出现的异常情况。在此基础上,设计了一种逐层相关性传播方法,将计算过程中的异常情况映射到属性的异常情况上。同时,考虑到数据集可能已经包含一些有用的信息,我们为一种可以低成本获得的数据集设计了过滤规则,以使计算结果更准确地呈现,这应该有助于专业人员更快地锁定和解决入侵威胁。