Ajou University repository

Industrial network-based behavioral anomaly detection in AI-enabled smart manufacturingoa mark
Citations

SCOPUS

17

Citation Export

DC Field Value Language
dc.contributor.authorKim, Hyun Jin-
dc.contributor.authorShon, Taeshik-
dc.date.issued2022-07-01-
dc.identifier.urihttps://dspace.ajou.ac.kr/dev/handle/2018.oak/32597-
dc.description.abstractExisting manufacturing systems are isolated from the outside world to protect their sites and systems. However, following the trend of the 4th Industrial Revolution, manufacturing systems have also increased the connectivity of various domains and the convergence of numerous technologies. These systems are referred to as smart manufacturing systems. However, this trend has increased the challenge of network anomaly detection methods, which are a major approach to network security in smart manufacturing. Existing methods define normality under the premise that network components are static, and network operation is periodic compared to the information technology environment. Therefore, comprehensive and volatile network environments require significant time, cost, and labor to define normality. Consequently, artificial intelligence (AI)-based anomaly detection studies have been actively conducted to solve this problem. However, such studies require manual analysis based on expert knowledge of each site during the preprocessing stage to extract the learning features from the collected network data. To solve the above problems, this study proposes a protocol reverse engineering method corresponding to the preprocessing stage of exiting AI studies. Through this method, existing AI-based anomaly detection studies can directly use the collected network data to learn normality without expert knowledge of the site. Furthermore, non-polling or reporting network operating environments that are rarely studied in the manufacturing security domain are targeted. Finally, we propose an anomaly detection method that uses an external signature, time information, the pattern of time intervals, and classified messages. Thus, the proposed method can detect anomalies in the encrypted contents of the manufacturing protocols.-
dc.description.sponsorshipThis research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF), funded by the Ministry of Science, ICT & Future Planning (NRF-2018R1D1A1B07043349).-
dc.language.isoeng-
dc.publisherSpringer-
dc.subject.meshAnomaly detection-
dc.subject.meshAnomaly detection methods-
dc.subject.meshExpert knowledge-
dc.subject.meshIndustrial networks-
dc.subject.meshNetwork anomaly detection-
dc.subject.meshNetwork data-
dc.subject.meshNetwork-based-
dc.subject.meshNetworks security-
dc.subject.meshSmart manufacturing-
dc.subject.meshSmart manufacturing system-
dc.titleIndustrial network-based behavioral anomaly detection in AI-enabled smart manufacturing-
dc.typeArticle-
dc.citation.endPage13563-
dc.citation.startPage13554-
dc.citation.titleJournal of Supercomputing-
dc.citation.volume78-
dc.identifier.bibliographicCitationJournal of Supercomputing, Vol.78, pp.13554-13563-
dc.identifier.doi10.1007/s11227-022-04408-4-
dc.identifier.scopusid2-s2.0-85126753752-
dc.identifier.urlhttp://www.springerlink.com/content/0920-8542-
dc.subject.keywordAnomaly detection-
dc.subject.keywordNetwork security-
dc.subject.keywordSmart manufacturing system-
dc.description.isoatrue-
dc.subject.subareaTheoretical Computer Science-
dc.subject.subareaSoftware-
dc.subject.subareaInformation Systems-
dc.subject.subareaHardware and Architecture-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

SHON, TAE SHIK Image
SHON, TAE SHIK손태식
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.