Ajou University repository

Industrial network-based behavioral anomaly detection in AI-enabled smart manufacturingoa mark
Citations

SCOPUS

17

Citation Export

Publication Year
2022-07-01
Publisher
Springer
Citation
Journal of Supercomputing, Vol.78, pp.13554-13563
Keyword
Anomaly detectionNetwork securitySmart manufacturing system
Mesh Keyword
Anomaly detectionAnomaly detection methodsExpert knowledgeIndustrial networksNetwork anomaly detectionNetwork dataNetwork-basedNetworks securitySmart manufacturingSmart manufacturing system
All Science Classification Codes (ASJC)
Theoretical Computer ScienceSoftwareInformation SystemsHardware and Architecture
Abstract
Existing manufacturing systems are isolated from the outside world to protect their sites and systems. However, following the trend of the 4th Industrial Revolution, manufacturing systems have also increased the connectivity of various domains and the convergence of numerous technologies. These systems are referred to as smart manufacturing systems. However, this trend has increased the challenge of network anomaly detection methods, which are a major approach to network security in smart manufacturing. Existing methods define normality under the premise that network components are static, and network operation is periodic compared to the information technology environment. Therefore, comprehensive and volatile network environments require significant time, cost, and labor to define normality. Consequently, artificial intelligence (AI)-based anomaly detection studies have been actively conducted to solve this problem. However, such studies require manual analysis based on expert knowledge of each site during the preprocessing stage to extract the learning features from the collected network data. To solve the above problems, this study proposes a protocol reverse engineering method corresponding to the preprocessing stage of exiting AI studies. Through this method, existing AI-based anomaly detection studies can directly use the collected network data to learn normality without expert knowledge of the site. Furthermore, non-polling or reporting network operating environments that are rarely studied in the manufacturing security domain are targeted. Finally, we propose an anomaly detection method that uses an external signature, time information, the pattern of time intervals, and classified messages. Thus, the proposed method can detect anomalies in the encrypted contents of the manufacturing protocols.
Language
eng
URI
https://dspace.ajou.ac.kr/dev/handle/2018.oak/32597
DOI
https://doi.org/10.1007/s11227-022-04408-4
Fulltext

Type
Article
Funding
This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF), funded by the Ministry of Science, ICT & Future Planning (NRF-2018R1D1A1B07043349).
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

SHON, TAE SHIK Image
SHON, TAE SHIK손태식
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.