Ajou University repository

Visualization for internet of things: power system and financial network cases
Citations

SCOPUS

10

Citation Export

DC Field Value Language
dc.contributor.authorKim, Myungjong-
dc.contributor.authorJo, Wooyeon-
dc.contributor.authorKim, Jaehoon-
dc.contributor.authorShon, Taeshik-
dc.date.issued2019-02-01-
dc.identifier.urihttps://dspace.ajou.ac.kr/dev/handle/2018.oak/30428-
dc.description.abstractNational critical infrastructure networks, such as banks and industrial control systems (ICSs), can be serious damaged in the event of a security incident. Therefore, in all these major infrastructures, closed networks are constructed to cut off the attack path. However, owing to the emergence of cloud, Internet of Things (IoT), and artificial intelligence (AI) services, network interconnection is rapidly increasing; thus, many major infrastructure networks can no longer be called closed networks. The ICS, which was previously a strictly closed network, is now usually called Industrial Internet of Things (IIoT) and exhibits many changes, such as smart factories and remote control. Many payment modules use the financial network through IoT or AI-assisted services. In this massive connected environment, the existing closed network defense system may cause difficulties in providing the service. Therefore, there is a need for technology that can continuously monitor the possibility of advanced attacks. In this paper, we define the normal-behavior-based rules from the perspective of network forensics and conduct visualization studies to detect all possible attacks against the control protocol DNP3 (Distributed Network Protocol) and the financial protocol called FIX (Finance Information Exchange). Thus, we detected suspicious network packets on the ICS network and the financial network and identified abnormal behavior that could be the basis of serious attacks.-
dc.description.sponsorship- This research was supported by the Ministry of Science and ICT (MSIT), Korea, under the Information Technology Research Center support program IITP-2018-2016-0-00304 supervised by the Institute for Information & Communications Technology Promotion (IITP). - This work was supported by an IITP grant funded by the Korean government (MSIT) (No. 2018-0-00336, Advanced Manufacturing Process Anomaly Detection to prevent the Smart Factory Operation Failure by Cyber Attacks). - This work was supported by the Ajou University research fund.-
dc.description.sponsorshipAcknowledgements - This research was supported by the Ministry of Science and ICT (MSIT), Korea, under the Information Technology Research Center support program IITP-2018-2016-0-00304 supervised by the Institute for Information & Communications Technology Promotion (IITP). -This work was supported by an IITP grant funded by the Korean government (MSIT) (No. 2018-0-00336, Advanced Manufacturing Process Anomaly Detection to prevent the Smart Factory Operation Failure by Cyber Attacks). -This work was supported by the Ajou University research fund.-
dc.language.isoeng-
dc.publisherSpringer New York LLC-
dc.subject.meshDistributed network protocols-
dc.subject.meshDNP3-
dc.subject.meshFinancial networks-
dc.subject.meshIndustrial control systems-
dc.subject.meshInfrastructure networks-
dc.subject.meshInternet of Things (IOT)-
dc.subject.meshNetwork defense systems-
dc.subject.meshNetwork interconnections-
dc.titleVisualization for internet of things: power system and financial network cases-
dc.typeArticle-
dc.citation.endPage3265-
dc.citation.startPage3241-
dc.citation.titleMultimedia Tools and Applications-
dc.citation.volume78-
dc.identifier.bibliographicCitationMultimedia Tools and Applications, Vol.78, pp.3241-3265-
dc.identifier.doi10.1007/s11042-018-6730-x-
dc.identifier.scopusid2-s2.0-85055580012-
dc.identifier.urlhttps://link.springer.com/journal/11042-
dc.subject.keywordDNP3-
dc.subject.keywordFinancial network-
dc.subject.keywordFIX-
dc.subject.keywordIndustrial control system-
dc.subject.keywordNetwork forensics-
dc.subject.keywordVisualization-
dc.description.isoafalse-
dc.subject.subareaSoftware-
dc.subject.subareaMedia Technology-
dc.subject.subareaHardware and Architecture-
dc.subject.subareaComputer Networks and Communications-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Kim, Jae-Hoon Image
Kim, Jae-Hoon김재훈
Department of Industrial Engineering
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.