4.7 Article

A Taxonomy of Supervised Learning for IDSs in SCADA Environments

Journal

ACM COMPUTING SURVEYS
Volume 53, Issue 2, Pages -

Publisher

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3379499

Keywords

SCADA security; network intrusion; machine learning; supervised learning

Funding

  1. Australian Research Council (ARC) [LP160100406]

Ask authors/readers for more resources

Supervisory Control and Data Acquisition (SCADA) systems play an important role in monitoring industrial processes such as electric power distribution, transport systems, water distribution, and wastewater collection systems. Such systems require a particular attention with regards to security aspects, as they deal with critical infrastructures that are crucial to organizations and countries. Protecting SCADA systems from intrusion is a very challenging task because they do not only inherit traditional IT security threats but they also include additional vulnerabilities related to field components (e.g., cyber-physical attacks). Many of the existing intrusion detection techniques rely on supervised learning that consists of algorithms that are first trained with reference inputs to learn specific information, and then tested on unseen inputs for classification purposes. This article surveys supervised learning from a specific security angle, namely SCADA-based intrusion detection. Based on a systematic review process, existing literature is categorized and evaluated according to SCADA-specific requirements. Additionally, this survey reports on well-known SCADA datasets and testbeds used with machine learning methods. Finally, we present key challenges and our recommendations for using specific supervised methods for SCADA systems.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Software Engineering

Energy efficient resource controller for Apache Storm

MohammadReza HoseinyFarahabady, Javid Taheri, Albert Y. Zomaya, Zahir Tari

Summary: This article presents a CPU throttling control strategy to optimize the energy consumption of the Apache Storm platform, and validates its effectiveness in a multi-core system.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2023)

Article Computer Science, Theory & Methods

Engineering Blockchain-based Software Systems: Foundations, Survey, and Future Directions

Mahdi Fahmideh, John Grundy, Aakash Ahmad, Jun Shen, Jun Yan, Davoud Mougouei, Peng Wang, Aditya Ghose, Anuradha Gunawardana, Uwe Aickelin, Babak Abedin

Summary: This article presents a systematic literature review of the state-of-the-art in Blockchain-based Software (BBS) engineering research from the perspective of software engineering discipline. It provides a rich repertoire of development tasks, design principles, models, roles, challenges, and resolution techniques in BBS engineering.

ACM COMPUTING SURVEYS (2023)

Article Computer Science, Software Engineering

The Influence of Human Aspects on Requirements Engineering-related Activities: Software Practitioners' Perspective

Dulaji Hidellaarachchi, John Grundy, Rashina Hoda, Ingo Mueller

Summary: Requirements Engineering (RE)-related activities heavily rely on collaboration between various roles in software engineering (SE), making it highly human-dependent. This study aims to understand the influence of human aspects, particularly motivation and personality, on RE-related activities from the perspective of software practitioners. The findings highlight the importance of motivation, domain knowledge, attitude, communication skills, and personality in RE-related activities, providing insights into key motivational factors and desirable personality characteristics for effective involvement in RE. The study also identifies areas needing further investigation and provides recommendations for future research.

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY (2023)

Article Computer Science, Information Systems

An Autonomic Workload Prediction and Resource Allocation Framework for Fog-Enabled Industrial IoT

Mohit Kumar, Avadh Kishor, Jitendra Kumar Samariya, Albert Y. Zomaya

Summary: The Internet of Things (IoT) has transformed the industry by providing various facilities and advancements. To meet the requirements of the industrial IoT system, an autonomic workload prediction and resource allocation framework is introduced. This framework efficiently allocates resources among fog nodes (FNs) based on workload prediction using a deep autoencoder (DAE) model and optimal FN selection using the crow search algorithm (CSA). The proposed scheme outperforms existing optimization models in terms of cost, delay, and workload execution.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Interdisciplinary Applications

The Flash Loan Attack Analysis (FAA) Framework-A Case Study of the Warp Finance Exploitation

Warodom Werapun, Tanakorn Karode, Tanwa Arpornthip, Jakapan Suaboot, Esther Sangiamkul, Pawita Boonrat

Summary: Decentralized finance (DeFi) has gained significant popularity and a billion-dollar market cap. However, uncollateralized lending, also known as a flash loan, has become a major tool used by attackers to exploit DeFi networks. This paper introduces the Flash loan Attack Analysis (FAA) framework, which provides a quantitative analysis of the impacts of different factors on the effectiveness of preventative measures in the DeFi system. The simulation results show that the existing strategy can fully protect the platform in a normal market environment but fails in a highly volatile market, causing significant financial losses.

INFORMATICS-BASEL (2023)

Article Computer Science, Software Engineering

Supporting Developers in Addressing Human-Centric Issues in Mobile Apps

Hourieh Khalajzadeh, Mojtaba Shahin, Humphrey O. Obie, Pragya Agrawal, John Grundy

Summary: Failure to consider the characteristics, limitations, and abilities of diverse end-users during mobile app development may lead to human-centric issues for end-users. This paper examines the human-centric issues reported by end-users through app reviews and discussed by developers on GitHub. It also investigates the feasibility and usefulness of an automated tool for detecting and classifying human-centric issues. The findings highlight the importance of addressing these issues and suggest possible future work to improve mobile app development.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2023)

Article Computer Science, Software Engineering

A Framework for Emotion-Oriented Requirements Change Handling in Agile Software Engineering

Kashumi Madampe, Rashina Hoda, John Grundy

Summary: This study investigates the impact of requirements changes on software practitioners and identifies key challenges, emotional impacts, influencing factors, and practices for better handling changes. It emphasizes the importance of synergy between agility, emotional intelligence, and cognitive intelligence in handling changes with positive emotions in socio-technical environments.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2023)

Article Computer Science, Theory & Methods

Privacy for IoT: Informed consent management in Smart Buildings

Chehara Pathmabandu, John Grundy, Mohan Baruwal Chhetri, Zubair Baig

Summary: Smart Buildings (SBs) use IoT technologies to automate operations and services, aiming to increase efficiency, maximize comfort, and minimize environmental impact. However, these cloud-based smart devices can capture and share sensitive data about occupants, exposing them to privacy threats. Users often lack awareness and fail to protect their privacy due to the convenience offered by IoT devices, resulting in a privacy paradox. To address this, a novel solution for informed consent management in shared smart spaces is proposed. This solution increases user awareness, provides visibility into privacy conformance, and enables informed decision-making. A reference architecture and proof-of-concept prototype are provided, and the proposed solution is validated through expert interviews.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Computer Science, Software Engineering

Dealing With Data Challenges When Delivering Data-Intensive Software Solutions

Ulrike M. Graetsch, Hourieh Khalajzadeh, Mojtaba Shahin, Rashina Hoda, John Grundy

Summary: This article presents a socio-technical grounded theory study conducted through interviews with 24 practitioners in multi-disciplinary data-intensive software teams (MDSTs). The study aims to understand the challenges faced by MDSTs when delivering data-intensive software solutions. The findings highlight the key concern of data-related challenges and provide a theory that explains the challenges, the context in which they occur, the causes, and the consequences. The study also identifies strategies and contingencies applied to address these challenges. The findings have implications for practitioners and researchers in understanding and dealing with data challenges.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2023)

Article Computer Science, Information Systems

SAZyzz: Scaling AZyzzyva to Meet Blockchain Requirements

Nasrin Sohrabi, Zahir Tari, Gauthier Voron, Vincent Gramoli, Qiang Fu

Summary: SAZyzz is a leader-based Byzantine Fault Tolerant consensus protocol for partially synchronous networks that improves performance and scalability compared to existing protocols. It adopts a tree-based communication model and reduces communication complexity.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Information Systems

Dynamic Parallel Flow Algorithms With Centralized Scheduling for Load Balancing in Cloud Data Center Networks

Wei-Kang Chung, Yun Li, Chih-Heng Ke, Sun-Yuan Hsieh, Albert Y. Zomaya, Rajkumar Buyya

Summary: BCube, a well-known network structure for data center networks (DCNs), provides multiple low-diameter paths and good fault-tolerance. This paper proposes two centralized dynamic parallel flow scheduling algorithms, CDPFS and CDPFSMP, to decrease collisions and improve bandwidth utilization in BCube topology. The simulation results demonstrate that our algorithms leverage the advantages of BCube structure and achieve high-performance solutions for load balancing problems, improving throughput by 44.1% in random bijective traffic pattern and 36.2% in data shuffle compared with the BSR algorithm.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Information Systems

Latency and Energy-Aware Load Balancing in Cloud Data Centers: A Bargaining Game Based Approach

Avadh Kishor, Rajdeep Niyogi, Anthony Theodore Chronopoulos, Albert Y. Zomaya

Summary: This paper addresses the problem of latency and energy-aware load balancing in a cloud computing system. It formulates the problem as a cooperative game and proposes an efficient algorithm called LEWIS to compute the solution. Experimental results show that LEWIS not only reduces response time and energy consumption but also improves fairness to end-users.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Automation & Control Systems

Request Dispatching Over Distributed SDN Control Plane: A Multiagent Approach

Victoria Huang, Gang Chen, Xingquan Zuo, Albert Y. Zomaya, Nasrin Sohrabi, Zahir Tari, Qiang Fu

Summary: Software-defined networking (SDN) enables flexible and centralized control in cloud data centers. To provide sufficient and cost-effective processing capacity, an elastic set of distributed SDN controllers is often required. However, the challenge arises in dispatching requests among the controllers by SDN switches. This article proposes MADRina, a Multiagent Deep Reinforcement Learning approach, to design adaptable and high-performance dispatching policies.

IEEE TRANSACTIONS ON CYBERNETICS (2023)

Article Computer Science, Artificial Intelligence

Efficient and Effective One-Step Multiview Clustering

Jun Wang, Chang Tang, Zhiguo Wan, Wei Zhang, Kun Sun, Albert Y. Zomaya

Summary: Multiview clustering algorithms have achieved superior performance in various fields, but most of them are difficult to apply to large-scale datasets due to their cubic complexity. Moreover, they often rely on a two-stage scheme to obtain clustering labels, which results in suboptimal solutions. Therefore, an efficient and effective one-step multiview clustering method is proposed to directly obtain clustering indicators with a small-time burden. The method constructs smaller similarity graphs and generates low-dimensional latent features to form a unified partition representation, from which a binary indicator matrix can be directly obtained. The fusion of latent information and the clustering task in a joint framework improve the clustering result.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2023)

No Data Available