Ajou University repository

RNN-based anomaly detection in DNP3 transport layer
Citations

SCOPUS

12

Citation Export

DC Field Value Language
dc.contributor.authorKwon, Sungmoon-
dc.contributor.authorYoo, Hyunguk-
dc.contributor.authorShon, Taeshik-
dc.date.issued2019-10-01-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/36475-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85076412834&origin=inward-
dc.description.abstractAs more sophisticated cyberattacks against industrial control systems (ICSs) such as crashoverride and TRITON occur frequently, the security of ICS is becoming more and more emphasized. Currently, many security researches have been conducted on ICSs, but most studies focus on messages at the application layer containing data, and the transport layer for data transmission is not considered. However, problems at the transport layer can interfere with normal data acquisition and cause problems in availability which is a key characteristic of the control system. In addition, attacks that exploit this point do not require detailed knowledge of the control system, which may result in fatal results with a lower level of difficulty than other attacks, so security of the transport layer should also be considered as an important factor. Therefore, in this paper, we 1)analyze the transport layer attack that interferes with data acquisition and the protocols that attacks are effective by analyzing from an attacker's perspective, 2) analyzed transport layer attacks in the DNP3 protocol widely used in ICSs, 3) in order to detect this, propose a many to one bidirectional recurrent neural network (RNN) based detection technique considering the characteristics of ICS, and 4) describe the verification of the proposed model through an actual substation's DNP3 packet.-
dc.description.sponsorshipThis research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (NRF-2018R1D1A1B07043349) and the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2019-2016-0-00304) supervised by the IITP(Institute for Information & communications Technology Planning & Evaluation).-
dc.language.isoeng-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.subject.meshApplication layers-
dc.subject.meshBidirectional recurrent neural networks-
dc.subject.meshDNP3-
dc.subject.meshIndustrial control systems-
dc.subject.meshKey characteristics-
dc.subject.meshLevel of difficulties-
dc.subject.meshReassembly-
dc.subject.meshSecurity research-
dc.titleRNN-based anomaly detection in DNP3 transport layer-
dc.typeConference-
dc.citation.conferenceDate2019.10.21. ~ 2019.10.23.-
dc.citation.conferenceName2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2019-
dc.citation.edition2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2019-
dc.citation.title2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2019-
dc.identifier.bibliographicCitation2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2019-
dc.identifier.doi10.1109/smartgridcomm.2019.8909701-
dc.identifier.scopusid2-s2.0-85076412834-
dc.identifier.urlhttp://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8901543-
dc.subject.keywordDeep learning-
dc.subject.keywordDisabling reassembly attack-
dc.subject.keywordDNP3-
dc.subject.keywordICS security-
dc.type.otherConference Paper-
dc.description.isoafalse-
dc.subject.subareaArtificial Intelligence-
dc.subject.subareaComputer Networks and Communications-
dc.subject.subareaEnergy Engineering and Power Technology-
dc.subject.subareaElectrical and Electronic Engineering-
dc.subject.subareaSafety, Risk, Reliability and Quality-
dc.subject.subareaControl and Optimization-
dc.subject.subareaTransportation-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

SHON, TAE SHIK Image
SHON, TAE SHIK손태식
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.