Ítem
Acceso Abierto

Detección de anomalías en tráfico de red de Sistemas de Control Industrial soportada en algoritmos de machine learning

dc.contributor.advisorDíaz López, Daniel Orlando
dc.creatorTristancho Muñoz, Miguel Angel
dc.creator.degreeMagíster en Matemáticas Aplicadas y Ciencias de la Computación
dc.creator.degreetypeFull time
dc.date.accessioned2023-03-24T21:27:37Z
dc.date.available2023-03-24T21:27:37Z
dc.date.created2023-02-07
dc.descriptionEstablecer un sistema de análisis de tráfico de red basado en algoritmos de machine learning (ML), orientado a sistemas de control industrial que permita: la identificación de comportamientos anormales para evitar la explotación de vulnerabilidades que afecten la seguridad de procesos industriales reduciendo riesgos de disponibilidad y soporte la continuidad del negocio.
dc.description.abstractThe growing development of computer networks associated with industrial systems and their integration with corporate networks (Internet) have made this group a desired target for cybercriminals worldwide. Mitigating this type of risk is one of the highest priorities for integrators, manufacturers, and users of control systems due to the great impact that can occur on the economy, the environment and the people in an organization when materialization occurs. of an attempted attack or sabotage of industrial processes. It is becoming increasingly important for industrial organizations to become aware of the weakness of these systems and seek organizational structures for security management that help them optimize their protection against external threats from all points of view to detect and address incidents. security-related issues before they become a major problem.
dc.format.extent78 pp
dc.format.mimetypeapplication/pdf
dc.identifier.doihttps://doi.org/10.48713/10336_38272
dc.identifier.urihttps://repository.urosario.edu.co/handle/10336/38272
dc.language.isospa
dc.publisherUniversidad del Rosariospa
dc.publisher.departmentEscuela de Ingeniería, Ciencia y Tecnologíaspa
dc.publisher.programMaestría en Matemáticas Aplicadas y Ciencias de la Computaciónspa
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International*
dc.rights.accesRightsinfo:eu-repo/semantics/openAccess
dc.rights.accesoAbierto (Texto Completo)
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.source.bibliographicCitationV. Atluri and J. Horne, "A Machine Learning based Threat Intelligence Framework for Industrial Control System Network Traffic Indicators of Compromise," SoutheastCon 2021, 2021, pp. 1-5, doi: 10.1109/SoutheastCon45413.2021.9401809.
dc.source.bibliographicCitationJ. M. Beaver, R. C. Borges-Hink and M. A. Buckner, "An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications," 2013 12th International Conference on Machine Learning and Applications, 2013, pp. 54-59, doi: 10.1109/ICMLA.2013.105.
dc.source.bibliographicCitationH. Lan, X. Zhu, J. Sun and S. Li, "Traffic Data Classification to Detect Man-in-the-Middle Attacks in Industrial Control System," 2019 6th International Conference on Dependable Systems and Their Applications (DSA), 2020, pp. 430-434, doi: 10.1109/DSA.2019.00067.
dc.source.bibliographicCitationS. M. Rachmawati, D. -S. Kim and J. -M. Lee, "Machine Learning Algorithm in Network Traffic Classification," 2021 International Conference on Information and Communication Technology Convergence (ICTC), 2021, pp. 1010-1013, doi: 10.1109/ICTC52510.2021.9620746.
dc.source.bibliographicCitationS. P. Khedkar and R. AroulCanessane, "Machine Learning Model for classification of IoT Network Traffic," 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2020, pp. 166-170, doi: 10.1109/I-SMAC49090.2020.9243468.
dc.source.bibliographicCitationH. Li and S. Qin, "Optimization and implementation of industrial control system network intrusion detection by telemetry analysis," 2017 3rd IEEE International Conference on Computer and Communications (ICCC), 2017, pp. 1251-1254, doi: 10.1109/CompComm.2017.8322743.
dc.source.bibliographicCitationH. Singh, "Performance Analysis of Unsupervised Machine Learning Techniques for Network Traffic Classification," 2015 Fifth International Conference on Advanced Computing & Communication Technologies, 2015, pp. 401-404, doi: 10.1109/ACCT.2015.54.
dc.source.bibliographicCitationChi-Ho Tsang and S. Kwong, "Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction," 2005 IEEE International Conference on Industrial Technology, 2005, pp. 51-56, doi: 10.1109/ICIT.2005.1600609.
dc.source.bibliographicCitationE. D. Knapp, J.T. Langill, “Industrial Network Security, Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems”, ISBN: 978-0-12-420114-9.
dc.source.bibliographicCitationW. Chen, T. Liu, Y. Tang, D. Xu, “Multi-level adaptive coupled method for industrial control networks safety based on machine learning”, Safety Science, Volume 120, 2019, Pages 268-275, ISSN 0925-7535, https://doi.org/10.1016/j.ssci.2019.07.012.
dc.source.bibliographicCitationE. Anthi, L. Williams, M. Rhode, P. Burnap, A.Wedgbury, “Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems”, Journal of Information Security and Applications, Volume 58, 2021, 102717, ISSN 2214-2126, https://doi.org/10.1016/j.jisa.2020.102717.
dc.source.bibliographicCitationJ. Pei, K. Zhong, M. Ahmad Jan, J. Li, “Personalized federated learning framework for network traffic anomaly detection”, Computer Networks, Volume 209, 2022, 108906, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2022.108906.
dc.source.bibliographicCitationA. Shahraki, M. Abbasi, A. Taherkordi, A.Delia Jurcut, “A comparative study on online machine learning techniques for network traffic streams analysis”, Computer Networks, Volume 207, 2022, 108836, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2022.108836.
dc.source.bibliographicCitationJ. Vávra, M. Hromada, L. Lukáš, J.Dworzecki, “Adaptive anomaly detection system based on machine learning algorithms in an industrial control environment, International Journal of Critical Infrastructure Protection”, Volume 34, 2021, 100446, ISSN 1874-5482, https://doi.org/10.1016/j.ijcip.2021.100446.
dc.source.bibliographicCitationM. A. Umer, K. N. Junejo, M. T. Jilani, A. P. Mathur, “Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations”, International Journal of Critical Infrastructure Protection, Volume 38, 2022, 100516, ISSN 1874-5482, https://doi.org/10.1016/j.ijcip.2022.100516.
dc.source.bibliographicCitationI. Chakraborty, B. M. Kelley, B. Gallagher, “Industrial control system device classification using network traffic features and neural network embeddings”, Array, Volume 12, 2021, 100081, ISSN 2590-0056, https://doi.org/10.1016/j.array.2021.100081.
dc.source.bibliographicCitationYask & B. Suresh Kumar (2019), “A review of model on malware detection and protection for the distributed control systems (Industrial control systems) in oil & gas sectors”, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 531-540, DOI: 10.1080/09720529.2019.1642623
dc.source.bibliographicCitationJ. F. Brenner (2013), “Eyes wide shut: The growing threat of cyber-attacks on industrial control systems”, Bulletin of the Atomic Scientists, 69:5, 15-20, DOI: 10.1177/0096340213501372
dc.source.bibliographicCitationS. Bagui, X. Fang, E. Kalaimannan, S.C. Bagui & Joseph Sheehan (2017), “Comparison of machine-learning algorithms for classification of VPN network traffic flow using time-related features”, Journal of Cyber Security Technology, 1:2, 108-126, DOI: 10.1080/23742917.2017.1321891
dc.source.bibliographicCitationP. Ackerman, “Industrial Cybersecurity, Efficiently secure critical infrastructure systems”, Published by Packt Publishing Ltd, ISBN 978-1-78839-515-1.
dc.source.bibliographicCitationJ. McCarthy, E Division, D Faatz, “Securing the Industrial Internet of Things: Cybersecurity for Distributed Energy Resources”, NIST SPECIAL PUBLICATION 1800-32, National Institute of Standards and Technology, https://www.nccoe.nist.gov/iiot
dc.source.instnameinstname:Universidad del Rosario
dc.source.reponamereponame:Repositorio Institucional EdocURspa
dc.subjectMachine learning
dc.subjectSistemas de control industrial ICS
dc.subjectTráfico de red industrial
dc.subjectDetección de anomalías
dc.subjectReducción de riesgos en seguridad de procesos industriales
dc.subject.keywordMachine Learning
dc.subject.keywordCibersecurity
dc.titleDetección de anomalías en tráfico de red de Sistemas de Control Industrial soportada en algoritmos de machine learning
dc.title.TranslatedTitleDetection of anomalies in red traffic of Industrial Control Systems supported by machine learning algorithms
dc.typebachelorThesis
dc.type.documentTrabajo de grado
dc.type.spaTrabajo de grado
Archivos
Bloque original
Mostrando1 - 1 de 1
Cargando...
Miniatura
Nombre:
Deteccion-de-anomalías-en- trafico-de-red-de-Sistemas-de-Control.pdf
Tamaño:
3.95 MB
Formato:
Adobe Portable Document Format
Descripción: