Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Hyunjin | - |
dc.contributor.author | Kim, Sungjin | - |
dc.contributor.author | Jo, Wooyeon | - |
dc.contributor.author | Kim, Ki Hyun | - |
dc.contributor.author | Shon, Taeshik | - |
dc.date.issued | 2021-01-01 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/32019 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85105863716&origin=inward | - |
dc.description.abstract | A cyber-physical infrastructure system (CPIS) is a system that controls and manages critical infrastructure such as smart manufacturing, water treatment facilities, power generation, and distribution facilities. Although these CPISs focus on the security of air-gapped network environments, strict isolation from the outside network is difficult to achieve, leading to various attacks. CPISs also comprise various devices and proprietary communication protocols that are used exclusively for each domain and site. Therefore, experts have to adopt a customized strategy to enhance security in CPIS networks after analyzing each domain, device, and protocol in advance. These methods require a significant amount of time, cost, and manpower; consequently, they are difficult to apply existing security methods in the real field. As a solution, a method is proposed herein that includes the following: 1) inferencing the CPIS protocol format and field semantics based on the characteristics of CPIS networks and protocols; 2) multilevel anomaly detection based on the meaning and values of each inferred field. The proposed method does not require knowledge of each site and protocol. In addition, the inference method can be used to analyze the payload field, including the state and measurement value, as well as the header field. Finally, we validate the proposed technique using an open-source CPIS network dataset including response injection, command injection, denial-of-service, and reconnaissance attacks. In addition, in the aspect of detection efficiency, the proposed technique exhibits comparable performance to that of existing knowledge-based anomaly detection methods. | - |
dc.description.sponsorship | This work was supported in part by the Institute of Information and Communications Technology Planning and Evaluation (IITP) Grant by the Korean Government through the Ministry of Science and ICT (MSIT) (Advanced manufacturing process anomaly detection to prevent the smart factory operation failure by cyber-attacks) under Grant 2018-0-00336, and in part by the Energy Cloud Research and Development Program through the National Research Foundation of Korea (NRF) Grant by the Ministry of Science and ICT under Grant 2019M3F2A1073385. | - |
dc.language.iso | eng | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.subject.mesh | Anomaly detection methods | - |
dc.subject.mesh | Command injections | - |
dc.subject.mesh | Detection efficiency | - |
dc.subject.mesh | Distribution facilities | - |
dc.subject.mesh | Infrastructure systems | - |
dc.subject.mesh | Network environments | - |
dc.subject.mesh | Smart manufacturing | - |
dc.subject.mesh | Water treatment facilities | - |
dc.title | Unknown Payload Anomaly Detection Based on Format and Field Semantics Inference in Cyber-Physical Infrastructure Systems | - |
dc.type | Article | - |
dc.citation.endPage | 75552 | - |
dc.citation.startPage | 75542 | - |
dc.citation.title | IEEE Access | - |
dc.citation.volume | 9 | - |
dc.identifier.bibliographicCitation | IEEE Access, Vol.9, pp.75542-75552 | - |
dc.identifier.doi | 2-s2.0-85105863716 | - |
dc.identifier.scopusid | 2-s2.0-85105863716 | - |
dc.identifier.url | http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639 | - |
dc.subject.keyword | cyber security | - |
dc.subject.keyword | Cyber-physical infrastructure systems | - |
dc.subject.keyword | Ethernet-based industrial protocol | - |
dc.subject.keyword | industrial control systems | - |
dc.subject.keyword | unknown payload anomaly detection | - |
dc.type.other | Article | - |
dc.description.isoa | true | - |
dc.subject.subarea | Computer Science (all) | - |
dc.subject.subarea | Materials Science (all) | - |
dc.subject.subarea | Engineering (all) | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.