Feasibility of Using Seq-GAN Model in Vulnerability Detection of Industrial Control Protocols

Authors

  • Jiafa Zhang China Southern Power Grid Digital Grid Group Information and Communication Technology Co., Ltd, Guangzhou City, Guangdong Province, China 510663
  • Hong Zou China Southern Power Grid Digital Grid Group Information and Communication Technology Co., Ltd, Guangzhou City, Guangdong Province, China 510663
  • Zifeng Zeng China Southern Power Grid Digital Grid Group Information and Communication Technology Co., Ltd, Guangzhou City, Guangdong Province, China 510663
  • Weijie Xu China Southern Power Grid Digital Grid Group Information and Communication Technology Co., Ltd, Guangzhou City, Guangdong Province, China 510663
  • Jiawei Jiang China Southern Power Grid Digital Grid Group Information and Communication Technology Co., Ltd, Guangzhou City, Guangdong Province, China 510663

DOI:

https://doi.org/10.13052/jcsm2245-1439.1333

Keywords:

Seq-GAN, industrial safety, control protocol, vulnerability detection, feasibility

Abstract

Continuous improvement of internet technology has driven the continuous progress and improvement of industrial control systems, and provided more support for security vulnerability detection in this field. Combining the GAN model, the detection model based on Seq-GAN in industrial control protocol vulnerabilities constructed in this article provides more options for further improving the security of industrial control systems, and can detect and analyse security vulnerabilities in industrial control protocols more efficiently and accurately. By comparing the performance of different models for security vulnerability detection, the Seq-GAN model has smaller prediction errors, can also obtain higher G-mean and F1-score values, and has sufficient reliability. At the same time, it can also improve the efficiency of vulnerability detection in industrial control systems, and can achieve better comprehensive detection performance. Therefore, the application of the Seq-GAN model in industrial control protocol vulnerability detection can provide more support for improving security detection in this field.

Downloads

Download data is not yet available.

Author Biographies

Jiafa Zhang, China Southern Power Grid Digital Grid Group Information and Communication Technology Co., Ltd, Guangzhou City, Guangdong Province, China 510663

Jiafa Zhang (May 1985) male, Han nationality, from Yangjiang, Guangdong, bachelor’s degree, working in China Southern Power Grid Digital Grid Group Information and Communication Technology Co., Ltd., engineer, research direction: cyberspace security.

Hong Zou, China Southern Power Grid Digital Grid Group Information and Communication Technology Co., Ltd, Guangzhou City, Guangdong Province, China 510663

Hong Zou (August 1986), male, Han nationality, born in Loudi, Hunan Province, master’s degree, working in China Southern Power Grid Digital Grid Group Information and Communication Technology Co., Ltd, Senior engineer, research direction: network security, data security.

Zifeng Zeng, China Southern Power Grid Digital Grid Group Information and Communication Technology Co., Ltd, Guangzhou City, Guangdong Province, China 510663

Zifeng Zeng (May 1997), male, Han nationality, from Yangjiang, Guangdong, bachelor’s degree, working in China Southern Power Grid Digital Grid Group Information and Communication Technology Co., Ltd., engineer, research direction: cyberspace security.

Weijie Xu, China Southern Power Grid Digital Grid Group Information and Communication Technology Co., Ltd, Guangzhou City, Guangdong Province, China 510663

Weijie Xu (July 1993) male, Han nationality, from Quanzhou, Fujian, bachelor’s degree, working in China Southern Power Grid Digital Grid Group Information and Communication Technology Co., Ltd. research direction: cyberspace security.

Jiawei Jiang, China Southern Power Grid Digital Grid Group Information and Communication Technology Co., Ltd, Guangzhou City, Guangdong Province, China 510663

Jiawei Jiang (August 1997) male, Han nationality, Fujian Jianouren, master’s degree, working in China Southern Power Grid Digital Grid Group Information and Communication Technology Co., Ltd., title, research direction: cyberspace security.

References

Lasi H, Fettke P, Kemper H-G, et al. Industry 4.0[J]. Business & information systems engineering, 2014, 6(4):239–242.

Alzahrani A, Aldhyani H H T. Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System[J]. Sustainability, 2023, 15(10):162–139.

Lamshöft, K., Hielscher, J., Krätzer, C., and Dittmann, J. The Threat of Covert Channels in Network Time Synchronisation Protocols. Journal of Cyber Security and Mobility, 2022, 11(02), 165–204.

Yaofang Z, Zibo W, Yingzhou W, et al. A risk assessment model for similar attack scenarios in industrial control system[J]. The Journal of Supercomputing, 2023, 79(14):955–979.

Mohammed B, Ahmed A, Yaser D, et al. LPWAN Cyber Security Risk Analysis: Building a Secure IQRF Solution[J]. Sensors, 2023, 23(4): 59–79.

Meng Z, Xie Y, Sun J. Detecting Credit Card Fraud by Generative Adversarial Networks and Multi-head Attention Neural Networks[J]. IAENG International Journal of Computer Science, 2023, 50(2):42–59.

Xue, Y. Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features[J]. Journal of Cyber Security and Mobility, 2023, 12(5), 697–710.

Rowan T H, Liming Z, Tomasz B. Generative Adversarial Networks–Enabled Human–Artificial Intelligence Collaborative Applications for Creative and Design Industries: A Systematic Review of Current Approaches and Trends[J]. Frontiers in Artificial Intelligence, 2021, 4(6):132–148.

John C. Industrial control system risk assessment standards and leading practices in the chemical industry[J]. Process Safety Progress, 2022, 41(4):665–669.

Li E, Kang C, Huang D, et al. Quantitative Model of Attacks on Distribution Automation Systems Based on CVSS and Attack Trees[J]. Information, 2019, 10(8):215–251.

Salamon J, Bello J P. Deep convolutional neural networks and data augmentation for environmental sound classification[J]. IEEE Signal Processing Letters, 2017, 24(3): 279–283.

Jili T, Yang B, Zhuoyi C, et al. Improved constrained min-max optimization for MPC tracking control in industrial networked process systems[J]. Measurement and Control, 2023, 56(1–2):114–123.

Dari, E. Y., Bendahmane, A., and Essaaidi, M. Optimal Method for Detecting Collusive Saboteur Smart Meters in Smart Grid[J]. Journal of Cyber Security and Mobility, 2020, 9(2), 237–264.

Lv Z. A novel LightGBM-based industrial internet intrusion detection method[J]. International Journal of Computer Applications in Technology, 2023, 71(3):208–216.

Lv W, Xiong J, Shi J, et al. A deep convolution generative adversarial networks based fuzzing framework for industry control protocols[J]. Journal of Intelligent Manufacturing, 2020, 32(2):1–17.

Yun S, Zhaoyu C, Xuejun L, et al. Adaptive Industrial Control System Attack Sample Expansion Algorithm Based on Generative Adversarial Network[J]. Applied Sciences, 2022, 12(17):102–121.

Mingyu K, Ran Z, Duxin C, et al. CM-GAN: A Cross-Modal Generative Adversarial Network for Imputing Completely Missing Data in Digital Industry.[J]. IEEE transactions on neural networks and learning systems, 2023.

Zheng M, Li T, Zhu R, et al. Conditional Wasserstein generative adversarial network-gradient penalty-based approach to alleviating imbalanced data classification[J]. Information Sciences, 2020, 5(12): 1009–1023.

Kim K. GAN based augmentation for improving anomaly detection accuracy in host-based intrusion detection systems[J]. Int. J. Eng. Res. Technol, 2020, 13: 3987.

Wei G, Yijin W, Xin C, et al. Federated transfer learning for auxiliary classifier generative adversarial networks: framework and industrial application.[J]. Journal of intelligent manufacturing, 2023.

Jin R, Niu Q. Research on textile defects detection based on improved generative adversarial network[J]. Journal of Engineered Fibers and Fabrics, 2022, 17.

Mingwei Z, Min Z, Min Y, et al. Generative Adversarial Network of Industrial Positron Images on Memory Module[J]. Entropy, 2022, 24(6):793–805.

Purandhar N, Ayyasamy S, Kumar P. Classification of clustered health care data analysis using generative adversarial networks (GAN)[J]. Soft Computing, 2022, 26(12):511–521.

Vagan T, Svitlana G, Mariia G. Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems[J]. Procedia Computer Science, 2021, 180.

Sohn K, Sung E C, Koo G, et al. Artificial intelligence in the fashion industry: consumer responses to generative adversarial network (GAN) technology[J]. International Journal of Retail & Distribution Management, 2020, 49(1):61–80.

He R, Li X, Chen G, et al. Generative adversarial network-based semi-supervised learning for real-time risk warning of process industries[J]. Expert Systems With Applications, 2020, 150.

Szubert B, Cole J E, Monaco C, et al. Structure-preserving visualisation of high dimensional single-cell datasets[J]. Scientific reports, 2019, 9(1):1-10.

Oh E, Lee H. An Imbalanced Data Handling Framework for Industrial Big Data Using a Gaussian Process Regression-Based Generative Adversarial Network[J]. Symmetry, 2020, 12(4):46–67.

Zhang K, Zhang Y, Cheng H. CrackGAN: A Labor-Light Crack Detection Approach Using Industrial Pavement Images Based on Generative Adversarial Learning.[J]. CoRR, 2019, abs/1909.08216.

Liu X, Li T, Zhang R, et al. A GAN and Feature Selection-Based Oversampling Technique for Intrusion Detection[J]. Security and Communication Networks, 2021.

Yue G, Ping G, Lanxin L. An End-to-End model based on CNN-LSTM for Industrial Fault Diagnosis and Prognosis[C] //International Conference on Network Infrastructure and Digital Content (IC-NIDC). 2018: 274–278.

Downloads

Published

2024-04-09

How to Cite

1.
Zhang J, Zou H, Zeng Z, Xu W, Jiang J. Feasibility of Using Seq-GAN Model in Vulnerability Detection of Industrial Control Protocols. JCSANDM [Internet]. 2024 Apr. 9 [cited 2024 Jul. 25];13(03):393-416. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/24021

Issue

Section

Cyber Security Issues and Solutions