Ajou University repository

Two-Phase Industrial Control System Anomaly Detection Using Communication Patterns and Deep Learningoa mark
  • Kim, Sungjin ;
  • Jo, Wooyeon ;
  • Kim, Hyunjin ;
  • Choi, Seokmin ;
  • Jung, Da I. ;
  • Choi, Hyeonho ;
  • Shon, Taeshik
Citations

SCOPUS

1

Citation Export

DC Field Value Language
dc.contributor.authorKim, Sungjin-
dc.contributor.authorJo, Wooyeon-
dc.contributor.authorKim, Hyunjin-
dc.contributor.authorChoi, Seokmin-
dc.contributor.authorJung, Da I.-
dc.contributor.authorChoi, Hyeonho-
dc.contributor.authorShon, Taeshik-
dc.date.issued2024-04-01-
dc.identifier.issn2079-9292-
dc.identifier.urihttps://dspace.ajou.ac.kr/dev/handle/2018.oak/34159-
dc.description.abstractSeveral cases of Industrial Internet of Things (IIoT) attacks with zero-day vulnerabilities have been reported. To prevent these attacks, it is necessary to apply an abnormal behavior detection method; however, there are three main problems that make it hard. First, there are various industrial communication protocols. Instead of IT environments, many unstandardized protocols, which are usually defined by vendors, are used. Second, legacy devices are commonly used, not only EOS (End-of-service), but also EoL (End-of-Life). And last, the analysis of collected data is necessary for defining normal behavior. This behavior should be separately defined in each IIoT. Therefore, it is difficult to apply abnormal behavior detection in environments where economic and human investment is difficult. To solve these problems, we propose a deep learning based abnormal behavior detection technique that utilizes IIoT communication patterns. The proposed method uses a deep learning technique to train periodic data acquisition sequences, which is one of the common characteristics of IIoT. The trained model determined the sequence of packet is normal. The proposed technique can be applied without an additional analysis. The proposed method is expected to prevent security threats by proactively detecting cyberattacks. To verify the proposed method, a dataset was collected from the Korea Electric Power Control System. The model that defines normal behavior based on the application layer exhibits an accuracy of 79.6%. The other model, defining normal behavior based on the transport layer, has an accuracy of 80.9%. In these two models, most false positives and false negatives only occur when the abnormal packet is in a sequence.-
dc.description.sponsorshipThis research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (NRF-2018R1D1A1B07043349).-
dc.language.isoeng-
dc.publisherMultidisciplinary Digital Publishing Institute (MDPI)-
dc.titleTwo-Phase Industrial Control System Anomaly Detection Using Communication Patterns and Deep Learning-
dc.typeArticle-
dc.citation.titleElectronics (Switzerland)-
dc.citation.volume13-
dc.identifier.bibliographicCitationElectronics (Switzerland), Vol.13-
dc.identifier.doi10.3390/electronics13081520-
dc.identifier.scopusid2-s2.0-85191377222-
dc.identifier.urlwww.mdpi.com/journal/electronics-
dc.subject.keywordanomaly detection-
dc.subject.keywordindustrial 4.0-
dc.subject.keywordindustrial control system-
dc.subject.keywordindustrial IoT-
dc.subject.keywordsecurity with deep learning-
dc.description.isoatrue-
dc.subject.subareaControl and Systems Engineering-
dc.subject.subareaSignal Processing-
dc.subject.subareaHardware and Architecture-
dc.subject.subareaComputer Networks and Communications-
dc.subject.subareaElectrical and Electronic Engineering-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

SHON, TAE SHIK Image
SHON, TAE SHIK손태식
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.