Home
Author Guide
Editor Guide
Reviewer Guide
Special Issues
Special Issue Introduction
Special Issues List
Topics
Published Issues
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2010
2009
2008
2007
2006
journal menu
Aims and Scope
Editorial Board
Indexing Service
Article Processing Charge
Open Access Policy
Publication Ethics
Digital Preservation Policy
Editorial Process
Subscription
Contact Us
General Information
ISSN:
1796-2021 (Online); 2374-4367 (Print)
Abbreviated Title:
J. Commun.
Frequency:
Monthly
DOI:
10.12720/jcm
Abstracting/Indexing:
Scopus
;
DBLP
;
CrossRef
,
EBSCO
,
Google Scholar
;
CNKI,
etc.
E-mail questions
or comments to
editor@jocm.us
Acceptance Rate:
27%
APC:
800 USD
Average Days to Accept:
88 days
3.4
2023
CiteScore
51st percentile
Powered by
Article Metrics in Dimensions
Editor-in-Chief
Prof. Maode Ma
College of Engineering, Qatar University, Doha, Qatar
I'm very happy and honored to take on the position of editor-in-chief of JCM, which is a high-quality journal with potential and I'll try my every effort to bring JCM to a next level...
[Read More]
What's New
2024-10-16
Vol. 19, No. 10 has been published online!
2024-08-20
Vol. 19, No. 8 has been published online!
2024-07-22
Vol. 19, No. 7 has been published online!
Home
>
Published Issues
>
2021
>
Volume 16, No. 6, June 2021
>
An Autoencoder-Based Network Intrusion Detection System for the SCADA System
Mustafa Altaha
1
, Jae-Myeong Lee
1
, Muhammad Aslam
2
, and Sugwon Hong
1
1. Dept. of Computer Engineering, Myongji University, Yongin, R. of Korea
2. Dept. of Electrical Engineering, Myongji University, Yongin, R. of Korea
Abstract
—The intrusion detection system (IDS) is the main tool to do security monitoring that is one of the security strategies for the supervisory control and data acquisition (SCADA) system. In this paper, we develop an IDS based on the autoencoder deep learning model (AE-IDS) for the SCADA system. The target SCADA communication protocol of the detection model is the Distributed Network Protocol 3 (DNP3), which is currently the most commonly utilized communication protocol in the power substation. Cyberattacks that we consider are data injection or modification attacks, which are the most critical attacks in the SCADA systems. In this paper, we extracted 17 data features from DNP3 communication, and use them to train the autoencoder network. We measure accuracy and loss of detection and compare them with different supervised deep learning algorithms. The unsupervised AE-IDS model shows better performance than the other deep learning IDS models.
Index Terms
—Network intrusion detection system, DNP3, SCADA, autoencoder, deep learning, cybersecurity
Cite: Mustafa Altaha, Jae-Myeong Lee, Muhammad Aslam, and Sugwon Hong, "An Autoencoder-Based Network Intrusion Detection System for the SCADA System," Journal of Communications vol. 16, no. 6, pp. 210-216, June 2021. Doi: 10.12720/jcm.16.6.210-216
Copyright © 2021 by the authors. This is an open access article distributed under the Creative Commons Attribution License (
CC BY-NC-ND 4.0
), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.
2-IEE020
PREVIOUS PAPER
An Internet Platform to Monitor Plant Pathogens Spread: The Italian Case of Xylella
NEXT PAPER
NOMA Application to Satellite Communication Networks for 5G: A Comprehensive Survey of Existing Studies