全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于时间序列分析的工业控制以太网流量异常检测

Keywords: 工业控制系统,工业以太网流量,结构时间序列模型,状态空间模型

Full-Text   Cite this paper   Add to My Lib

Abstract:

为提高工业网络中异常流量的检测精度,提出了基于结构时间序列分析的流量异常检测方案,将工业以太网流量分解成不同组分,并辅以状态空间模型,将复杂的网络流量进行分层建模,从而有效提高了工业网络异常流量检测精度,降低了误报率.与传统的X-12结构时间序列分析法相比,其平均精度上升38%,所以本文方法对于异常检测系统的效率改善明显.

References

[1]  SOOYEON S, TAEKYOUNG K, JO Gil-yong, et al. An experimental study of hierarchical intrusion detection for wireless industrial sensor networks[J]. IEEE Transaction on Industrial Informatics, 2012, 6(4): 744-757.
[2]  RICK A J, BARRY H. A system-aware cyber security architecture[J]. Systems Engineering, 2012, 15 (2): 225-240.
[3]  刘芳, 毛志忠, 李磊. 基于模糊自回归隐马尔可夫模型的控制过程异常数据检测[J]. 仪器仪表学报, 2010, 31(5): 984-990.
[4]  LIU Fang, MAO Zhi-zhong, LI Lei. Outlier detection for control process data based on fuzzy ARHMM[J]. Chinese Journal of Scientific Instrument, 2010, 31(5): 984-990. (in Chinese)
[5]  CHIARA B, MIGUEL á Sanz-bobi. Auto-regressive processes explained by self-organized maps: application to the detection of abnormal behavior in industrial processes[J]. IEEE Transactions on Neural Networks, 2011, 22(12): 2078-2090.
[6]  MIN W, KEECHEON K. Intrusion detection scheme using traffic prediction for wireless industrial networks[J]. Journal of Communications and Networks, 2012, 14(3): 310-318.
[7]  侯重远, 江汉红, 芮万智, 等. 工业网络流量异常检测的概率主成分分析法[J]. 西安交通大学学报, 2012, 46(2): 70-75.
[8]  HOU Chong-yuan, JIANG Han-hong, RUI Wan-zhi, et al. A probabilistic principal component analysis approach for detecting traffic anomaly in industrial networks[J]. Journal of Xi'an Jiaotong University, 2012, 46(2): 70-75. (in Chinese)
[9]  陈飞, 高铁梅. 结构时间序列模型在季节调整方面的应用[J]. 系统工程理论与实践, 2007(11): 7-14.
[10]  CHEN Fei, GAO Tie-mei. The application of the structure time series model on seasonal adjustment[J]. Systems Engineering-Theory & Practice, 2007 (11): 7-14. ( in Chinese)
[11]  FARZANEH K, DEREK W M, AMIR K K. Wireless data traffic estimation using a state-space model[J]. IEEE Transactions on Vehicular Technology, 2008, 57 (6): 3885-3890.
[12]  NICOLAS F, LIAM O M, ERIC C. W32. Stuxnet dossier [EB/OL]. [2011-02-11]. http://www. symanrec. com/content/en/us/enterprise/media/ security _ response/ whi-tepapers/ w32_stuxnet_dossier. pdf.
[13]  ALEKSANDR M, EUGENE R, DAVID H, et al. Stuxnet under the microscope[EB/OL]. [2010-7-19]. http://www. eset. com/ resources/ white-papers/ Stuxnet-Under-the-Microscope. pdf.
[14]  BéLA G, CHRISTOS S, IGOR N F, et al. A cyber-physical experimentation environment for the security analysis of networked industrial control systems[J]. Computers and Electrical Engineering, 2012, 38 (5):1146-1161.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133