Ajou University repository

APAD: Autoencoder-based Payload Anomaly Detection for industrial IoE
Citations

SCOPUS

79

Citation Export

DC Field Value Language
dc.contributor.authorKim, Sung Jin-
dc.contributor.authorJo, Woo Yeon-
dc.contributor.authorShon, Taeshik-
dc.date.issued2020-03-01-
dc.identifier.issn1568-4946-
dc.identifier.urihttps://dspace.ajou.ac.kr/dev/handle/2018.oak/31074-
dc.description.abstractThe Internet of Things era is being replaced by the Internet of Everything (IoE) era, where everything can communicate with everything else. With the advent of the fourth industrial revolution and the IoE era, industrial control systems (ICSs) are transitioning into industrial IoE (IIoE). The ICS, which is no longer a closed network, suffers from various cybersecurity threats. Since the attack of Stuxnet in 2010, the malware used to attack critical infrastructure (CI) has become increasingly sophisticated. Furthermore, recent attacks have mimicked normal network traffic. Therefore, investigating intrusion detection systems is necessary to detect these advanced cyberattacks. However, detecting advanced attacks, such as false data injection, is difficult because the traditional detection methods focus only on the protocol header fields. Most studies have not considered low-performance field devices, which are vulnerable to threats. Therefore, we have classified the extended reference model RAMI 4.0, which is the new ICS reference model in the fourth industrial revolution, into two levels: an operative level and a product process management level. A fast and lightweight algorithm is required at the operative level because the low-performance devices communicate with each other in real time. In addition, efficient data processing is important because considerable amount of data is concentrated at the product process management level. Based on these characteristics, a payload-based abnormal behavior detection method, i.e., the autoencoder-based payload anomaly detection (APAD), is proposed for each level. APAD uses an autoencoder to distinguish between normal and abnormal behaviors in low-performance devices. Furthermore, traffic analysis and a considerable amount of time are required to apply a traditional detection method at the product process management level. However, the proposed method does not require long-time traffic analysis. It exhibits a higher detection rate compared with those exhibited by other methods based on verification using the open secure water treatment dataset called SWaT.-
dc.description.sponsorshipThis research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning ( NRF-2018R1D1A1B07043349 ).-
dc.language.isoeng-
dc.publisherElsevier Ltd-
dc.subject.meshAbnormal behavior detections-
dc.subject.meshFalse data injection-
dc.subject.meshIndustrial control systems-
dc.subject.meshIndustrial IoE-
dc.subject.meshIndustrial revolutions-
dc.subject.meshIntrusion Detection Systems-
dc.subject.meshNetwork anomaly detection-
dc.subject.meshReference modeling-
dc.titleAPAD: Autoencoder-based Payload Anomaly Detection for industrial IoE-
dc.typeArticle-
dc.citation.titleApplied Soft Computing Journal-
dc.citation.volume88-
dc.identifier.bibliographicCitationApplied Soft Computing Journal, Vol.88-
dc.identifier.doi10.1016/j.asoc.2019.106017-
dc.identifier.scopusid2-s2.0-85077004427-
dc.identifier.urlhttp://www.elsevier.com/wps/find/journaldescription.cws_home/621920/description#description-
dc.subject.keywordFalse data injection-
dc.subject.keywordIndustrial control system-
dc.subject.keywordIndustrial IoE-
dc.subject.keywordNetwork anomaly detection-
dc.subject.keywordSecurity with deep learning-
dc.description.isoafalse-
dc.subject.subareaSoftware-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

SHON, TAE SHIK Image
SHON, TAE SHIK손태식
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.