Anomaly Detection Methods for IIoT Networks

Page view(s)
26
Checked on Mar 25, 2024
Anomaly Detection Methods for IIoT Networks
Title:
Anomaly Detection Methods for IIoT Networks
Journal Title:
2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)
Publication Date:
31 July 2018
Citation:
L. Zhou and H. Guo, "Anomaly Detection Methods for IIoT Networks," 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Singapore, 2018, pp. 214-219. doi: 10.1109/SOLI.2018.8476769
Abstract:
IIoT networks are different from general IT networks such as office or business networks where multiple various types of applications, protocols and traffic profiles are presented, and the cyber security challenges are more on protecting data confidentiality and integrity than on network availability. IIoT networks have special features and face unique challenges in defending against cyber-attacks. This paper briefly describes the requirements and challenges in IIoT network security, and presents an overview of the existing network anomaly detection methods. The paper further presents other anomaly detection methods that are specifically applicable to IIoT networks, as those methods exploit the deterministic features of the physical world in detecting the anomalies in the observed behavior.
License type:
PublisherCopyrights
Funding Info:
This work was supported by the National Research Foundation (NRF), Prime Minister’s Office, Singapore, under its National Cybersecurity R&D Programme (Award No. NRF2014NCR-NCR001-31) and administered by the National Cybersecurity R&D Directorate. The special thanks are also given to SMRT Trains Ltd for providing domain knowledge and technical support.
Description:
ISBN:
978-1-5386-4522-2
978-1-5386-4521-5
Files uploaded:

File Size Format Action
anomaly-detection-methods-for-iiot-networks.pdf 169.18 KB PDF Open