Research Paper:
An Intrusion Detection Model Based on AFSA-SVM for Petroleum Multi-Channel Industrial Control Network Communication
Bo Yang, Yang Xiao, Xinzhang Wang, Zehao Cui, and Cheng Peng
CNOOC Energy Technology & Services-Oil Production Services Co.
5th Boundary Area, Donggu Petroleum New Village, Tanggu, Binhai New Area, Tianjin 300452, China
Corresponding author
To prevent viruses and zombie programs from affecting the secure communication of oil multi-channel industrial control networks, an intrusion detection model for oil multi-channel industrial control network communication based on AFSA-SVM is studied. Collect the communication status information of the oil multi-channel industrial control network. The communication status features of the oil multi-channel industrial control network are extracted from the collected information by using the foraging, clustering, and tail chasing behaviors of the artificial fish swarm algorithm (AFSA). The weighted information gain method is used to reduce the extracted features, take the reduced features as the input, and use the support vector machine (SVM) to realize the intrusion detection of the oil multi-channel industrial control network communication. The experimental results show that the communication state features extracted from the model are representative; after feature reduction, the weighted error measure of intrusion detection is significantly reduced; under different intrusion intensities, the single intrusion and mixed intrusion detection effects of the model are excellent, and the intrusion destination IP address can be obtained.
- [1] A. M. Y. Koay, R. K. L. Ko, H. Hettema, and K. Radke, “Machine learning in industrial control system (ICS) security: Current landscape, opportunities and challenges,” J. of Intelligent Information Systems, Vol.60, No.2, pp. 377-405, 2023. https://doi.org/10.1007/s10844-022-00753-1
- [2] L. Liang et al., “Task scheduling strategy for industrial control network based on cloud-edge-end fusion framework,” J. of Physics: Conf. Series, Vol.2405, Article No.012016, 2022. https://doi.org/10.1088/1742-6596/2405/1/012016
- [3] I.-C. Lin, C.-C. Chang, and Y.-S. Chang, “Data security and preservation mechanisms for industrial control network using IOTA,” Symmetry, Vol.14, No.2, Article No.237, 2022. https://doi.org/10.3390/sym14020237
- [4] C. Wang et al., “Dimension reduction technique based on supervised autoencoder for intrusion detection of industrial control systems,” Security and Communication Networks, Vol.2022, Article No.5713074, 2022. https://doi.org/10.1155/2022/5713074
- [5] B. Al-Muntaser, M. A. Mohamed, and A. Y. Tuama, “Real-time intrusion detection of insider threats in industrial control system workstations through file integrity monitoring,” Int. J. of Advanced Computer Science and Applications, Vol.14, No.6, 2023. https://doi.org/10.14569/IJACSA.2023.0140636
- [6] S. Nagarajan, S. Kayalvizhi, R. Subhashini, and V. Anitha, “Hybrid honey badger-world cup algorithm-based deep learning for malicious intrusion detection in industrial control systems,” Computers & Industrial Engineering, Vol.180, Article No.109166, 2023. https://doi.org/10.1016/j.cie.2023.109166
- [7] V. Kourepinis, C. Iliopoulou, I. Tassopoulos, and G. Beligiannis, “An artificial fish swarm optimization algorithm for the urban transit routing problem,” Applied Soft Computing, Vol.155, Article No.111446, 2024. https://doi.org/10.1016/j.asoc.2024.111446
- [8] G. Jayanthi and K. Balachander, “Energy management system using artificial fish swarm speed optimized fuzzy controller based on a deep recurrent neural learning classifier,” CT&F – Ciencia, Tecnología & Futuro, Vol.13, No.2, pp. 29-37, 2023. https://doi.org/10.29047/01225383.677
- [9] R. Sethuraman et al., “An optimized AdaBoost Multi-class support vector machine for driver behavior monitoring in the advanced driver assistance systems,” Expert Systems with Applications, Vol.212, Article No.118618, 2023. https://doi.org/10.1016/j.eswa.2022.118618
- [10] A. Kurani, P. Doshi, A. Vakharia, and M. Shah, “A comprehensive comparative study of artificial neural network (ANN) and support vector machines (SVM) on stock forecasting,” Annals of Data Science, Vol.10, No.1, pp. 183-208, 2023. https://doi.org/10.1007/s40745-021-00344-x
- [11] N. S. Bajaj et al., “Application of metaheuristic optimization based support vector machine for milling cutter health monitoring,” Intelligent Systems with Applications, Vol.18, Article No.200196, 2023. https://doi.org/10.1016/j.iswa.2023.200196
- [12] L. Zhao, F. Wang, and Y. Bai, “Route planning for autonomous vessels based on improved artificial fish swarm algorithm,” Ships and Offshore Structures, Vol.18, No.6, pp. 897-906, 2023. https://doi.org/10.1080/17445302.2022.2081423
- [13] B. Fields, S. Gupta, and M. Sandora, “Information gain as a tool for assessing biosignature missions,” Int. J. of Astrobiology, Vol.22, No.5, pp. 583-607, 2023. https://doi.org/10.1017/S1473550423000150
- [14] F. Guo, S. Su, and S. Zhong, “Can investors gain incremental information through online searching? Evidence from China,” Emerging Markets Finance and Trade, Vol.59, No.9, pp. 2994-3010, 2023. https://doi.org/10.1080/1540496X.2023.2190846
- [15] D. Gibson, V. Kovanovic, D. Ifenthaler, S. Dexter, and S. Feng, “Learning theories for artificial intelligence promoting learning processes,” British J. of Educational Technology, Vol.54, No.5, pp. 1125-1146, 2023. https://doi.org/10.1111/bjet.13341
This article is published under a Creative Commons Attribution-NoDerivatives 4.0 Internationa License.