2020
DOI: 10.1109/access.2020.2976745
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Methods for Industrial Protocol Security Analysis: Issues, Taxonomy, and Directions

Abstract: Machine learning has been widely studied in the security analysis of Industrial Control Systems (ICSs). However, in industrial scenarios, the amount of data as well as the speed of data generation are very different from standard machine learning data sets. Using these heterogeneous data and finding meaningful insights for practical security applications in ICSs is a big challenge. In addition, ICSs have been built for quite a long time. Security has not been seriously taken into account when ICSs were built. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 77 publications
0
6
0
Order By: Relevance
“…A survey on machine learning methods for the security of industrial protocols is presented in [77]. Since the main focus of the article [77] is on the protocols, the security weaknesses in many protocols are exposed.…”
Section: Our Articlementioning
confidence: 99%
“…A survey on machine learning methods for the security of industrial protocols is presented in [77]. Since the main focus of the article [77] is on the protocols, the security weaknesses in many protocols are exposed.…”
Section: Our Articlementioning
confidence: 99%
“…A survey on machine learning methods for the security of industrial protocols is presented in [73]. Since the main focus of the article [73] is on the protocols, the security weaknesses in many protocols are exposed.…”
Section: Our Article Communications Security In Inxmentioning
confidence: 99%
“…A survey on machine learning methods for the security of industrial protocols is presented in [73]. Since the main focus of the article [73] is on the protocols, the security weaknesses in many protocols are exposed. The authors provide methods of machine learning that are most helpful in analyzing the security of protocols in ICS.…”
Section: Our Article Communications Security In Inxmentioning
confidence: 99%
“…However, at present, research efforts are typically focusing on developing new techniques using innovative technologies such as Big Data [20] or ML/DL. In particular, the use of ML and DL techniques is increasing, which play a key role in detecting cyber attacks affecting the industrial field [21]. This section performs an exhaustive review of the most relevant works related to ML/DL for anomaly detection in the industrial context.…”
Section: Related Workmentioning
confidence: 99%