industrial control networks
Recently Published Documents


TOTAL DOCUMENTS

47
(FIVE YEARS 18)

H-INDEX

7
(FIVE YEARS 2)

2021 ◽  
Vol 5 (4) ◽  
pp. 72
Author(s):  
Maya Hilda Lestari Louk ◽  
Bayu Adhi Tama

Classifier ensembles have been utilized in the industrial cybersecurity sector for many years. However, their efficacy and reliability for intrusion detection systems remain questionable in current research, owing to the particularly imbalanced data issue. The purpose of this article is to address a gap in the literature by illustrating the benefits of ensemble-based models for identifying threats and attacks in a cyber-physical power grid. We provide a framework that compares nine cost-sensitive individual and ensemble models designed specifically for handling imbalanced data, including cost-sensitive C4.5, roughly balanced bagging, random oversampling bagging, random undersampling bagging, synthetic minority oversampling bagging, random undersampling boosting, synthetic minority oversampling boosting, AdaC2, and EasyEnsemble. Each ensemble’s performance is tested against a range of benchmarked power system datasets utilizing balanced accuracy, Kappa statistics, and AUC metrics. Our findings demonstrate that EasyEnsemble outperformed significantly in comparison to its rivals across the board. Furthermore, undersampling and oversampling strategies were effective in a boosting-based ensemble but not in a bagging-based ensemble.


Author(s):  
Haicheng Qu ◽  
Jianzhong Zhou ◽  
Jitao Qin ◽  
Xiaorong Tian

In traditional network anomaly detection algorithms, the anomaly threshold needs to be defined manually. Keeping this as background, this study proposes an anomaly detection algorithm (VAEOCSVM), which combines the variable auto-encoder (VAE) and one-class support vector machine (OCSVM) to realize anomaly detection in industrial control networks. First, the VAE model is used to obtain the distribution of the original normal sample data represented by the low-dimensional code; the reconstruction error of the VAE model is merged into the new input. Then, using OCSVM’s hinge-loss objective function and the random Fourier feature fitting radial basis function (RBF) kernel method, the OCSVM model is represented and solved using the deep neural network and gradient descent method. Finally, the decision function of the OCSVM model is constructed by using the solved parameter information to realize the detection of abnormal data. The proposed algorithm is compared with other machine-learning-based anomaly detection algorithms in terms of multiple indicators such as precision, recall, and [Formula: see text] score. The experimental results using various datasets show that the proposed algorithm has a better outlier recognition ability than the machine-learning-based anomaly detection algorithms.


Author(s):  
David Ginthör ◽  
René Guillaume ◽  
Naresh Nayak ◽  
Johannes von Hoyningen-Huene

2020 ◽  
Vol 26 (2) ◽  
pp. 47-53
Author(s):  
Richard Paes ◽  
David C. Mazur ◽  
Bruce K. Venne ◽  
Jack Ostrzenski

Information ◽  
2020 ◽  
Vol 11 (2) ◽  
pp. 105 ◽  
Author(s):  
Limengwei Liu ◽  
Modi Hu ◽  
Chaoqun Kang ◽  
Xiaoyong Li

The development and integration of information technology and industrial control networks have expanded the magnitude of new data; detecting anomalies or discovering other valid information from them is of vital importance to the stable operation of industrial control systems. This paper proposes an incremental unsupervised anomaly detection method that can quickly analyze and process large-scale real-time data. Our evaluation on the Secure Water Treatment dataset shows that the method is converging to its offline counterpart for infinitely growing data streams.


Author(s):  
Dinghua Zhang ◽  
Yibo Hu ◽  
Guoyan Cao ◽  
Yong Liu ◽  
Yuanbing Shi ◽  
...  

The autonomous security situation awareness on industrial networks communication has been a critical subject for industrial networks security analysis. In this paper, a CNN-based feature mining method for networks communication dataflow was proposed to intrusion detect industrial networks to extract security situation awareness. Specifically, a normalization technique uniforming different sorts of networks dataflow features was designed for dataflow features fusion in the proposed feature mining method. The proposed methods were used to detect the security situation of traditional IT networks and industrial control networks. Experiment results showed that the proposed feature analysis method had good transferability in the two network data, and the accuracy rate of network anomaly detection was ideal and had higher stability.


2020 ◽  
Vol 309 ◽  
pp. 02009
Author(s):  
Tao Zhang ◽  
Jianzhuang Li ◽  
Hao Luo ◽  
Yiru Fu ◽  
Jin Zhao ◽  
...  

The CAN bus is a serial communication network using the CAN protocol. The microcontroller of C8051F041 is a highly integrated mixed-signal system-on-a-chip with an integrated CAN bus controller. The article describes in detail how to implement remote update of all MCU Flash under the same CAN bus network. The result shows that all MCU Flash in the same bus network can be remotely updated. Only CAN bus is needed for update and no additional Connected. Program maintenance and maintenance costs can be effectively reduced in industrial control networks.


Sign in / Sign up

Export Citation Format

Share Document