Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms.

Autor: Obonna, Ugochukwu Onyekachi1 (AUTHOR) obonnaugochukwu@yahoo.com, Opara, Felix Kelechi1 (AUTHOR) felix.opara@futo.edu.ng, Mbaocha, Christian Chidiebere1 (AUTHOR) christian.mbaocha@futo.edu.ng, Obichere, Jude-Kennedy Chibuzo2 (AUTHOR) jude.obichere@futo.edu.ng, Akwukwaegbu, Isdore Onyema1 (AUTHOR) isdore.akwukwaegbu@futo.edu.ng, Amaefule, Miriam Mmesoma3 (AUTHOR) amaefulemiriam51@gmail.com, Nwakanma, Cosmas Ifeanyi4 (AUTHOR) cosmas.ifeanyi@kumoh.ac.kr
Předmět:
Zdroj: Future Internet. Aug2023, Vol. 15 Issue 8, p280. 19p.
Abstrakt: Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this may have largely been caused by the integration of open network to operation technology (OT) as a result of low-cost network expansion. The connection of OT to the internet for firmware updates, third-party support, or the intervention of vendors has exposed the industry to attacks. The inability to detect these unpredictable cyber-attacks exposes the PCN, and a successful attack can lead to devastating effects. This paper reviews the different forms of cyber-attacks in PCN of oil and gas installations while proposing the use of machine learning algorithms to monitor data exchanges between the sensors, controllers, processes, and the final control elements on the network to detect anomalies in such data exchanges. Python 3.0 Libraries, Deep-Learning Toolkit, MATLAB, and Allen Bradley RSLogic 5000 PLC Emulator software were used in simulating the process control. The outcomes of the experiments show the reliability and functionality of the different machine learning algorithms in detecting these anomalies with significant precise attack detections identified using tree algorithms (bagged or coarse) for man-in-the-middle (MitM) attacks while taking note of accuracy-computation complexity trade-offs. [ABSTRACT FROM AUTHOR]
Databáze: Library, Information Science & Technology Abstracts
Nepřihlášeným uživatelům se plný text nezobrazuje