Ítem
Acceso Abierto
Detección de anomalías en tráfico de red de Sistemas de Control Industrial soportada en algoritmos de machine learning
| dc.contributor.advisor | Díaz López, Daniel Orlando | |
| dc.creator | Tristancho Muñoz, Miguel Angel | |
| dc.creator.degree | Magíster en Matemáticas Aplicadas y Ciencias de la Computación | |
| dc.creator.degreetype | Full time | |
| dc.date.accessioned | 2023-03-24T21:27:37Z | |
| dc.date.available | 2023-03-24T21:27:37Z | |
| dc.date.created | 2023-02-07 | |
| dc.description | Establecer un sistema de análisis de tráfico de red basado en algoritmos de machine learning (ML), orientado a sistemas de control industrial que permita: la identificación de comportamientos anormales para evitar la explotación de vulnerabilidades que afecten la seguridad de procesos industriales reduciendo riesgos de disponibilidad y soporte la continuidad del negocio. | |
| dc.description.abstract | The growing development of computer networks associated with industrial systems and their integration with corporate networks (Internet) have made this group a desired target for cybercriminals worldwide. Mitigating this type of risk is one of the highest priorities for integrators, manufacturers, and users of control systems due to the great impact that can occur on the economy, the environment and the people in an organization when materialization occurs. of an attempted attack or sabotage of industrial processes. It is becoming increasingly important for industrial organizations to become aware of the weakness of these systems and seek organizational structures for security management that help them optimize their protection against external threats from all points of view to detect and address incidents. security-related issues before they become a major problem. | |
| dc.format.extent | 78 pp | |
| dc.format.mimetype | application/pdf | |
| dc.identifier.doi | https://doi.org/10.48713/10336_38272 | |
| dc.identifier.uri | https://repository.urosario.edu.co/handle/10336/38272 | |
| dc.language.iso | spa | |
| dc.publisher | Universidad del Rosario | spa |
| dc.publisher.department | Escuela de Ingeniería, Ciencia y Tecnología | spa |
| dc.publisher.program | Maestría en Matemáticas Aplicadas y Ciencias de la Computación | spa |
| dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | * |
| dc.rights.accesRights | info:eu-repo/semantics/openAccess | |
| dc.rights.acceso | Abierto (Texto Completo) | |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
| dc.source.bibliographicCitation | V. Atluri and J. Horne, "A Machine Learning based Threat Intelligence Framework for Industrial Control System Network Traffic Indicators of Compromise," SoutheastCon 2021, 2021, pp. 1-5, doi: 10.1109/SoutheastCon45413.2021.9401809. | |
| dc.source.bibliographicCitation | J. M. Beaver, R. C. Borges-Hink and M. A. Buckner, "An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications," 2013 12th International Conference on Machine Learning and Applications, 2013, pp. 54-59, doi: 10.1109/ICMLA.2013.105. | |
| dc.source.bibliographicCitation | H. Lan, X. Zhu, J. Sun and S. Li, "Traffic Data Classification to Detect Man-in-the-Middle Attacks in Industrial Control System," 2019 6th International Conference on Dependable Systems and Their Applications (DSA), 2020, pp. 430-434, doi: 10.1109/DSA.2019.00067. | |
| dc.source.bibliographicCitation | S. M. Rachmawati, D. -S. Kim and J. -M. Lee, "Machine Learning Algorithm in Network Traffic Classification," 2021 International Conference on Information and Communication Technology Convergence (ICTC), 2021, pp. 1010-1013, doi: 10.1109/ICTC52510.2021.9620746. | |
| dc.source.bibliographicCitation | S. P. Khedkar and R. AroulCanessane, "Machine Learning Model for classification of IoT Network Traffic," 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2020, pp. 166-170, doi: 10.1109/I-SMAC49090.2020.9243468. | |
| dc.source.bibliographicCitation | H. Li and S. Qin, "Optimization and implementation of industrial control system network intrusion detection by telemetry analysis," 2017 3rd IEEE International Conference on Computer and Communications (ICCC), 2017, pp. 1251-1254, doi: 10.1109/CompComm.2017.8322743. | |
| dc.source.bibliographicCitation | H. Singh, "Performance Analysis of Unsupervised Machine Learning Techniques for Network Traffic Classification," 2015 Fifth International Conference on Advanced Computing & Communication Technologies, 2015, pp. 401-404, doi: 10.1109/ACCT.2015.54. | |
| dc.source.bibliographicCitation | Chi-Ho Tsang and S. Kwong, "Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction," 2005 IEEE International Conference on Industrial Technology, 2005, pp. 51-56, doi: 10.1109/ICIT.2005.1600609. | |
| dc.source.bibliographicCitation | E. D. Knapp, J.T. Langill, “Industrial Network Security, Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems”, ISBN: 978-0-12-420114-9. | |
| dc.source.bibliographicCitation | W. Chen, T. Liu, Y. Tang, D. Xu, “Multi-level adaptive coupled method for industrial control networks safety based on machine learning”, Safety Science, Volume 120, 2019, Pages 268-275, ISSN 0925-7535, https://doi.org/10.1016/j.ssci.2019.07.012. | |
| dc.source.bibliographicCitation | E. Anthi, L. Williams, M. Rhode, P. Burnap, A.Wedgbury, “Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems”, Journal of Information Security and Applications, Volume 58, 2021, 102717, ISSN 2214-2126, https://doi.org/10.1016/j.jisa.2020.102717. | |
| dc.source.bibliographicCitation | J. Pei, K. Zhong, M. Ahmad Jan, J. Li, “Personalized federated learning framework for network traffic anomaly detection”, Computer Networks, Volume 209, 2022, 108906, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2022.108906. | |
| dc.source.bibliographicCitation | A. Shahraki, M. Abbasi, A. Taherkordi, A.Delia Jurcut, “A comparative study on online machine learning techniques for network traffic streams analysis”, Computer Networks, Volume 207, 2022, 108836, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2022.108836. | |
| dc.source.bibliographicCitation | J. Vávra, M. Hromada, L. Lukáš, J.Dworzecki, “Adaptive anomaly detection system based on machine learning algorithms in an industrial control environment, International Journal of Critical Infrastructure Protection”, Volume 34, 2021, 100446, ISSN 1874-5482, https://doi.org/10.1016/j.ijcip.2021.100446. | |
| dc.source.bibliographicCitation | M. A. Umer, K. N. Junejo, M. T. Jilani, A. P. Mathur, “Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations”, International Journal of Critical Infrastructure Protection, Volume 38, 2022, 100516, ISSN 1874-5482, https://doi.org/10.1016/j.ijcip.2022.100516. | |
| dc.source.bibliographicCitation | I. Chakraborty, B. M. Kelley, B. Gallagher, “Industrial control system device classification using network traffic features and neural network embeddings”, Array, Volume 12, 2021, 100081, ISSN 2590-0056, https://doi.org/10.1016/j.array.2021.100081. | |
| dc.source.bibliographicCitation | Yask & B. Suresh Kumar (2019), “A review of model on malware detection and protection for the distributed control systems (Industrial control systems) in oil & gas sectors”, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 531-540, DOI: 10.1080/09720529.2019.1642623 | |
| dc.source.bibliographicCitation | J. F. Brenner (2013), “Eyes wide shut: The growing threat of cyber-attacks on industrial control systems”, Bulletin of the Atomic Scientists, 69:5, 15-20, DOI: 10.1177/0096340213501372 | |
| dc.source.bibliographicCitation | S. Bagui, X. Fang, E. Kalaimannan, S.C. Bagui & Joseph Sheehan (2017), “Comparison of machine-learning algorithms for classification of VPN network traffic flow using time-related features”, Journal of Cyber Security Technology, 1:2, 108-126, DOI: 10.1080/23742917.2017.1321891 | |
| dc.source.bibliographicCitation | P. Ackerman, “Industrial Cybersecurity, Efficiently secure critical infrastructure systems”, Published by Packt Publishing Ltd, ISBN 978-1-78839-515-1. | |
| dc.source.bibliographicCitation | J. McCarthy, E Division, D Faatz, “Securing the Industrial Internet of Things: Cybersecurity for Distributed Energy Resources”, NIST SPECIAL PUBLICATION 1800-32, National Institute of Standards and Technology, https://www.nccoe.nist.gov/iiot | |
| dc.source.instname | instname:Universidad del Rosario | |
| dc.source.reponame | reponame:Repositorio Institucional EdocUR | spa |
| dc.subject | Machine learning | |
| dc.subject | Sistemas de control industrial ICS | |
| dc.subject | Tráfico de red industrial | |
| dc.subject | Detección de anomalías | |
| dc.subject | Reducción de riesgos en seguridad de procesos industriales | |
| dc.subject.keyword | Machine Learning | |
| dc.subject.keyword | Cibersecurity | |
| dc.title | Detección de anomalías en tráfico de red de Sistemas de Control Industrial soportada en algoritmos de machine learning | |
| dc.title.TranslatedTitle | Detection of anomalies in red traffic of Industrial Control Systems supported by machine learning algorithms | |
| dc.type | bachelorThesis | |
| dc.type.document | Trabajo de grado | |
| dc.type.spa | Trabajo de grado |
Archivos
Bloque original
1 - 1 de 1
Cargando...
- Nombre:
- Deteccion-de-anomalías-en- trafico-de-red-de-Sistemas-de-Control.pdf
- Tamaño:
- 3.95 MB
- Formato:
- Adobe Portable Document Format
- Descripción:



