{"title":"Automatic Control Network Anomaly Detection Based on Behavior Understanding","authors":"Jianhui Luo","doi":"10.1109/ICWS53863.2021.00087","DOIUrl":null,"url":null,"abstract":"In automatic control networks, for man-in-the-middle attacks, they tamper with the control instructions and the underlying feedback data, but the protocol and format of the data packet, making the attack difficult to detect. In this paper, we introduce a network intrusion detection model based on the automatic control network behavior understanding and machine learning. The model can understand the operating status of the control network from the correlation of parameter status, find abnormal behavior status that does not conform to the normal operating status, and locate and trace the source of the tampered instruction or parameter to understand the attacker's intention. We verified the feasibility and practicability of the model in simulating real automatic control network scenarios.","PeriodicalId":213320,"journal":{"name":"2021 IEEE International Conference on Web Services (ICWS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Web Services (ICWS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWS53863.2021.00087","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In automatic control networks, for man-in-the-middle attacks, they tamper with the control instructions and the underlying feedback data, but the protocol and format of the data packet, making the attack difficult to detect. In this paper, we introduce a network intrusion detection model based on the automatic control network behavior understanding and machine learning. The model can understand the operating status of the control network from the correlation of parameter status, find abnormal behavior status that does not conform to the normal operating status, and locate and trace the source of the tampered instruction or parameter to understand the attacker's intention. We verified the feasibility and practicability of the model in simulating real automatic control network scenarios.