2022
DOI: 10.3390/en15041517
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection in Cyclic Communication in OT Protocols

Abstract: This paper demonstrates the effectiveness of using anomaly detection in cyclic communication as a method aimed at protecting industrial installations from steganographic communication and a wide range of cyberattacks. The analysis was performed for a method based on deterministic finite automaton and the authors’ method using cycles. In this paper, we discuss the cycle detection algorithm and graph construction as well as demonstrate an anomaly detection method for cyberattack detection that utilizes stochasti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Industrial communication is characterized by high regularity, while cyclicality creates another dimension in order to study deviations. These resources are used by [ 26 ] in order to present a method for detecting anomalies in cyclic communication using the Modbus protocol.…”
Section: Other Related Workmentioning
confidence: 99%
“…Industrial communication is characterized by high regularity, while cyclicality creates another dimension in order to study deviations. These resources are used by [ 26 ] in order to present a method for detecting anomalies in cyclic communication using the Modbus protocol.…”
Section: Other Related Workmentioning
confidence: 99%
“…Threat detection might rely on signatures or anomalies [20,21]. In this paper, neural networks are used for anomaly detection and they are considered a heuristic approach [22].…”
Section: Cybersecurity and Artificial Intelligencementioning
confidence: 99%
“…The integration of intelligent technology with information technology is rapidly advancing, and remote monitoring and control through the internet is possible, but this convenience comes with potential security threats if proper measures are not taken [1] [2]. Smart devices like cameras must wirelessly transmit data to central servers due to limited energy and computing power [3].…”
Section: Introductionmentioning
confidence: 99%