Network traffic features for anomaly detection in specific industrial control system network

Matti Mantere (Corresponding Author), Mirko Sailio, Sami Noponen

    Research output: Contribution to journalArticleScientificpeer-review

    49 Citations (Scopus)

    Abstract

    The deterministic and restricted nature of industrial control system networks sets them apart from more open networks, such as local area networks in office environments. This improves the usability of network security, monitoring approaches that would be less feasible in more open environments. One of such approaches is machine learning based anomaly detection. Without proper customization for the special requirements of the industrial control system network environment, many existing anomaly or misuse detection systems will perform sub-optimally. A machine learning based approach could reduce the amount of manual customization required for different industrial control system networks. In this paper we analyze a possible set of features to be used in a machine learning based anomaly detection system in the real world industrial control system network environment under investigation. The network under investigation is represented by architectural drawing and results derived from network trace analysis. The network trace is captured from a live running industrial process control network and includes both control data and the data flowing between the control network and the office network. We limit the investigation to the IP traffic in the traces.
    Original languageEnglish
    Pages (from-to)460-473
    JournalFuture Internet
    Volume5
    Issue number4
    DOIs
    Publication statusPublished - 2013
    MoE publication typeA1 Journal article-refereed

    Keywords

    • industrial control systems
    • anomaly detection
    • machine learning
    • network security

    Fingerprint

    Dive into the research topics of 'Network traffic features for anomaly detection in specific industrial control system network'. Together they form a unique fingerprint.

    Cite this