Anomaly Detection Methods for IIoT Networks

Luying Zhou, Huaqun Guo
{"title":"Anomaly Detection Methods for IIoT Networks","authors":"Luying Zhou, Huaqun Guo","doi":"10.1109/SOLI.2018.8476769","DOIUrl":null,"url":null,"abstract":"IIoT networks are different from general IT networks such as office or business networks where multiple various types of applications, protocols and traffic profiles are presented, and the cyber security challenges are more on protecting data confidentiality and integrity than on network availability. IIoT networks have special features and face unique challenges in defending against cyber-attacks. This paper briefly describes the requirements and challenges in IIoT network security, and presents an overview of the existing network anomaly detection methods. The paper further presents other anomaly detection methods that are specifically applicable to IIoT networks, as those methods exploit the deterministic features of the physical world in detecting the anomalies in the observed behavior.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"24","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SOLI.2018.8476769","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 24

Abstract

IIoT networks are different from general IT networks such as office or business networks where multiple various types of applications, protocols and traffic profiles are presented, and the cyber security challenges are more on protecting data confidentiality and integrity than on network availability. IIoT networks have special features and face unique challenges in defending against cyber-attacks. This paper briefly describes the requirements and challenges in IIoT network security, and presents an overview of the existing network anomaly detection methods. The paper further presents other anomaly detection methods that are specifically applicable to IIoT networks, as those methods exploit the deterministic features of the physical world in detecting the anomalies in the observed behavior.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
工业物联网网络异常检测方法
工业物联网网络不同于一般的IT网络,如办公或商业网络,其中包含多种不同类型的应用程序、协议和流量配置文件,网络安全挑战更多地在于保护数据机密性和完整性,而不是网络可用性。工业物联网网络具有特殊的特性,在防御网络攻击方面面临着独特的挑战。本文简要介绍了工业物联网网络安全的需求和面临的挑战,并概述了现有的网络异常检测方法。本文进一步提出了其他特别适用于工业物联网网络的异常检测方法,因为这些方法利用了物理世界的确定性特征来检测观察到的行为中的异常。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Wideband Circularly Polarized UHF RFID Reader Antenna NFC-based Smart Notification System for Hospital Discharge Process and Bed Management Ensuring performance measurement integrity in logistics using blockchain Anonymization and Analysis of Horizontally and Vertically Divided User Profile Databases with Multiple Sensitive Attributes Inter-organizational Knowledge Flow and R&D portfolio of Patent Citation Network - The Case of the Socket Wrench Industry
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1