Self-similarity based network anomaly detection for industrial control systems

被引:0
|
作者
Martin, Bryan [1 ]
Bollmann, Chad A. [1 ]
机构
[1] Naval Postgrad Sch, Dept Elect & Comp Engn, Monterey, CA 93943 USA
关键词
self-similarity; long-range dependence; wireless networks; industrial control systems; machine-to-machine communications; TRAFFIC MODELS;
D O I
10.1109/CNS59707.2023.10288656
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network traffic has been shown to be self-similar across a wide range of protocols, including Ethernet, Wi-Fi, and cellular traffic. However, the composition of the Internet has grown since these initial findings to include machine-to-machine (M2M) traffic, which behaves differently than the human-generated traffic previously analyzed. In this changing landscape, it has yet to be shown if the M2M traffic generated in industrial control systems (ICS) is self-similar. This paper investigates the self-similarity of M2M traffic using network traffic from three publicly available datasets. We find that the M2M traffic was not self-similar for two of the datasets, while the third showed a low degree of self-similarity. Furthermore, we demonstrate using physical data that the Hurst parameter can be used as a metric to observe changes in the system configuration of an ICS and to detect anomalous activity in the network.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Network Anomaly Detection Based on the Statistical Self-similarity Factor
    Dymora, Pawel
    Mazurek, Miroslaw
    [J]. ANALYSIS AND SIMULATION OF ELECTRICAL AND COMPUTER SYSTEMS, 2015, 324 : 271 - 287
  • [2] Network Traffic Anomaly Detection Based on Self-similarity Using FRFT
    Ye, Xiaolong
    Lan, Julong
    Huang, Wanwei
    [J]. PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 837 - 840
  • [3] Network Traffic Anomaly Detection Using Weighted Self-similarity Based on EMD
    Han, Jieying
    Zhang, James Z.
    [J]. 2013 PROCEEDINGS OF IEEE SOUTHEASTCON, 2013,
  • [4] Network Traffic Anomaly Detection Based on Self-Similarity Using HHT and Wavelet Transform
    Cheng, Xiaorong
    Xie, Kun
    Wang, Dong
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 710 - 713
  • [5] Anomaly Detection in Nanofibrous Materials by CNN-Based Self-Similarity
    Napoletano, Paolo
    Piccoli, Flavio
    Schettini, Raimondo
    [J]. SENSORS, 2018, 18 (01)
  • [6] Network Traffic Detection Based on Histogram and Self-similarity Matrix
    Yang, Penglin
    Tao, Limin
    Wang, Haitao
    [J]. PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEM (ICISS 2018), 2018, : 207 - 209
  • [7] A real-time network based anomaly detection in industrial control systems
    Zare, Faeze
    Mahmoudi-Nasr, Payam
    Yousefpour, Rohollah
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2024, 45
  • [8] Application of wavelets and self-similarity to enterprise network intrusion detection and prevention systems
    Akujuobi, C. M.
    Ampah, N. K.
    Sadiku, Matthew N. O.
    [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2007, : 269 - 274
  • [9] Using Traffic Self-Similarity for Network Anomalies Detection
    Popa, Sorin Mihai
    Manea, George Marian
    [J]. 2015 20TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE, 2015, : 639 - 644
  • [10] Self-similarity based image edge detection
    Zhang, ZB
    [J]. ELECTRONIC IMAGING AND MULTIMEDIA TECHNOLOGY III, 2002, 4925 : 275 - 279