2019
DOI: 10.1109/access.2019.2960497
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Machine Learning Methods in EtherCAT-Based Anomaly Detection

Abstract: Today, the use of Ethernet-based protocols in industrial control systems (ICS) communications has led to the emergence of attacks based on information technology (IT) on supervisory control and data acquisition systems. In addition, the familiarity of Ethernet and TCP/IP protocols and the diversity and success of attacks on them raises security risks and cyber threats for ICS. This issue is compounded by the absence of encryption, authorization, and authentication mechanisms due to the development of industria… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(16 citation statements)
references
References 25 publications
0
16
0
Order By: Relevance
“…It is capable of addressing specific concerns in industries such as rapid response times, minimal data requirement for the devices engaged in communication, and efficient cost of implementation. With EtherCAT, the master sends data possibly only a single frame for the entire node network that will pass through each node [364]. However, the EtherCAT protocol lacks connectionbased security and flow issues for recognizing the masters and slaves in the network.…”
Section: ) Ethercatmentioning
confidence: 99%
“…It is capable of addressing specific concerns in industries such as rapid response times, minimal data requirement for the devices engaged in communication, and efficient cost of implementation. With EtherCAT, the master sends data possibly only a single frame for the entire node network that will pass through each node [364]. However, the EtherCAT protocol lacks connectionbased security and flow issues for recognizing the masters and slaves in the network.…”
Section: ) Ethercatmentioning
confidence: 99%
“…In addition, 4000 of them as test data sets contain 3987 normal data and 13 abnormal data. Now the proposed algorithm and the traditional BP algorithm are tested and compared by using the data collected by the industrial control system [23] . Due to the large normal database in the normal operation of the industrial control network, the false positive rate is not compared here.…”
Section: Industrial Control Simulation Testmentioning
confidence: 99%
“…Akpinar et al [35] proposed a learning-based intrusion detection method for the EtherCAT protocol, where an attack vector is created based on real-time data and a support vector machine training model is used to perform anomaly detection, which is used to detect anomalies in the communication protocol. In [36], the authors further classified the protocols into four categories by classifying the various features of the protocols. They produced 16 events in the 4 categories for anomaly detection, and the genetic algorithm-based support vector (GA-SVM) machine demonstrated good detection results.…”
Section: Related Workmentioning
confidence: 99%