IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v15y2023i8p280-d1221467.html
   My bibliography  Save this article

Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms

Author

Listed:
  • Ugochukwu Onyekachi Obonna

    (Department of Electrical/Electronic Engineering, Federal University of Technology, Owerri 340110, Nigeria)

  • Felix Kelechi Opara

    (Department of Electrical/Electronic Engineering, Federal University of Technology, Owerri 340110, Nigeria)

  • Christian Chidiebere Mbaocha

    (Department of Electrical/Electronic Engineering, Federal University of Technology, Owerri 340110, Nigeria)

  • Jude-Kennedy Chibuzo Obichere

    (Department of Mechatronics Engineering, Federal University of Technology, Owerri 340110, Nigeria)

  • Isdore Onyema Akwukwaegbu

    (Department of Electrical/Electronic Engineering, Federal University of Technology, Owerri 340110, Nigeria)

  • Miriam Mmesoma Amaefule

    (Department of Mathematics, Federal University of Technology, Owerri 340110, Nigeria)

  • Cosmas Ifeanyi Nwakanma

    (ICT Convergence Research Center, Kumoh National Institute of Technology, Gumi 39177, Republic of Korea)

Abstract

Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this may have largely been caused by the integration of open network to operation technology (OT) as a result of low-cost network expansion. The connection of OT to the internet for firmware updates, third-party support, or the intervention of vendors has exposed the industry to attacks. The inability to detect these unpredictable cyber-attacks exposes the PCN, and a successful attack can lead to devastating effects. This paper reviews the different forms of cyber-attacks in PCN of oil and gas installations while proposing the use of machine learning algorithms to monitor data exchanges between the sensors, controllers, processes, and the final control elements on the network to detect anomalies in such data exchanges. Python 3.0 Libraries, Deep-Learning Toolkit, MATLAB, and Allen Bradley RSLogic 5000 PLC Emulator software were used in simulating the process control. The outcomes of the experiments show the reliability and functionality of the different machine learning algorithms in detecting these anomalies with significant precise attack detections identified using tree algorithms (bagged or coarse ) for man-in-the-middle (MitM) attacks while taking note of accuracy-computation complexity trade-offs.

Suggested Citation

  • Ugochukwu Onyekachi Obonna & Felix Kelechi Opara & Christian Chidiebere Mbaocha & Jude-Kennedy Chibuzo Obichere & Isdore Onyema Akwukwaegbu & Miriam Mmesoma Amaefule & Cosmas Ifeanyi Nwakanma, 2023. "Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms," Future Internet, MDPI, vol. 15(8), pages 1-19, August.
  • Handle: RePEc:gam:jftint:v:15:y:2023:i:8:p:280-:d:1221467
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/15/8/280/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/15/8/280/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Marcio Andrey Teixeira & Tara Salman & Maede Zolanvari & Raj Jain & Nader Meskin & Mohammed Samaka, 2018. "SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach," Future Internet, MDPI, vol. 10(8), pages 1-15, August.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Sachin Sharma & Saish Urumkar & Gianluca Fontanesi & Byrav Ramamurthy & Avishek Nag, 2022. "Future Wireless Networking Experiments Escaping Simulations," Future Internet, MDPI, vol. 14(4), pages 1-32, April.
    2. Ali Alzahrani & Theyazn H. H. Aldhyani, 2023. "Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System," Sustainability, MDPI, vol. 15(10), pages 1-29, May.
    3. Alaa O. Khadidos & Hariprasath Manoharan & Shitharth Selvarajan & Adil O. Khadidos & Khaled H. Alyoubi & Ayman Yafoz, 2022. "A Classy Multifacet Clustering and Fused Optimization Based Classification Methodologies for SCADA Security," Energies, MDPI, vol. 15(10), pages 1-24, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:15:y:2023:i:8:p:280-:d:1221467. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.