2014 IEEE 10th International Conference on Intelligent Computer Communication and Processing (ICCP) 2014
DOI: 10.1109/iccp.2014.6937009
|View full text |Cite
|
Sign up to set email alerts
|

Data clustering-based anomaly detection in industrial control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
44
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 80 publications
(44 citation statements)
references
References 14 publications
0
44
0
Order By: Relevance
“…Until now, there are many researches on the machine learning-based anomaly detection in networked control systems, mainly including: clustering technique [30]- [32], neural network [33], [34], Bayes algorithm [21], genetic algorithm [35], fuzzy logic [36], and support vector method [37]- [41]. Furthermore, these approaches have a good adaptability and flexibility, but there are still some insufficiencies in feature extraction of industrial communication behaviors and model parameter optimization.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Until now, there are many researches on the machine learning-based anomaly detection in networked control systems, mainly including: clustering technique [30]- [32], neural network [33], [34], Bayes algorithm [21], genetic algorithm [35], fuzzy logic [36], and support vector method [37]- [41]. Furthermore, these approaches have a good adaptability and flexibility, but there are still some insufficiencies in feature extraction of industrial communication behaviors and model parameter optimization.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, we first determine the initial cluster centers by the information entropy of each element in all process data sequences, and then use K-means algorithm [32] to reduce the dimension of each process data sequence D i . The detailed algorithm can be described below:…”
Section: B Feature Selection and Extraction For Process Data Behaviormentioning
confidence: 99%
“…In 2014 Kiss et al [20] suggest that Modern Networked Critical Infrastructures (NCI), including advanced and physical systems, are introduced to sharp computerized attacks concentrating on the unfaltering operation of these structures. To ensure variation from the norm care, their watched data can be used as a piece of concurrence with data mining methods to make Intrusion Detection Systems (IDS) or Anomaly Detection Systems (ADS).…”
Section: Literature Surveymentioning
confidence: 99%
“…Clustering is used for security analytics for industrial control systems [11] in an networked critical infrastructure (NCI) environment. First, data outputs from various network sensors are arranged as vectors and K-means clustering is applied to group the vectors into clusters.…”
Section: Clustering For Security Analyticsmentioning
confidence: 99%