2018
DOI: 10.1109/tii.2017.2772082
|View full text |Cite
|
Sign up to set email alerts
|

A Method for Anomalies Detection in Real-Time Ethernet Data Traffic Applied to PROFINET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(6 citation statements)
references
References 24 publications
0
5
0
1
Order By: Relevance
“…Results show that accuracy, precision, and recall rates are acceptable when compared to previous studies; [14] and [18] are the most similar studies in terms of applied algorithms and testbed environment. In [14], accuracy was found to be between 92% and 99% for various ANN models, whereas the highest accuracy was found to be 100% with k-NN in our work. In [18], anomalies on the water management testbed were found by applying algorithms such as Best-first tree (BFTree), ANN and SVM.…”
Section: Results and Conclusionmentioning
confidence: 67%
See 1 more Smart Citation
“…Results show that accuracy, precision, and recall rates are acceptable when compared to previous studies; [14] and [18] are the most similar studies in terms of applied algorithms and testbed environment. In [14], accuracy was found to be between 92% and 99% for various ANN models, whereas the highest accuracy was found to be 100% with k-NN in our work. In [18], anomalies on the water management testbed were found by applying algorithms such as Best-first tree (BFTree), ANN and SVM.…”
Section: Results and Conclusionmentioning
confidence: 67%
“…In addition, Barford and Plonka defined anomalies in three groups: anomalies that are caused by hardware/configuration changes or interruptions in the network; anomalies that occur and disappear over time, such as increased access to a website; and anomalies which derive from manipulation of the network [13]. Similarly, Sestito et al stated that anomalies can be caused by four factors: attacks, network operations, flash crowds, and measurement errors [14].…”
Section: Related Workmentioning
confidence: 99%
“…Authors in [133] proposed an anomaly detection scheme for PROFINET networks. The captured data are processed using the sliding window algorithm to extract a subset of trafficrelated features, while an artificial neural network is used to classify the traffic based on those features.…”
Section: Profinetmentioning
confidence: 99%
“…For example, several machine learning (ML)-based methods have been separately proposed for anomaly detection in physical-layer log features (Q learning [18], Dyna-Q [19], Linear SVM [23], BDT [20] and neural networks [24]). Anomaly detection based on network-traffic features is also studied in a number of papers (artificial neural networks [21]). Anomaly detection based on physical-layer features uses the predictable behaviour of industrial control systems to detect anomalous behaviour [22].…”
Section: Background and Related Workmentioning
confidence: 99%