2016
DOI: 10.1186/s13638-016-0744-8
|View full text |Cite
|
Sign up to set email alerts
|

Network anomaly detection for railway critical infrastructure based on autoregressive fractional integrated moving average

Abstract: The article proposes a novel two-stage network traffic anomaly detection method for the railway transportation critical infrastructure monitored using wireless sensor networks (WSN). The first step of the proposed solution is to find and eliminate any outlying observations in the analyzed parameters of the WSN traffic using a simple and fast one-dimensional quartile criterion. In the second step, the remaining data is used to estimate autoregressive fractional integrated moving average (ARFIMA) statistical mod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 37 publications
0
7
0
Order By: Relevance
“…Information-Centric: If we examine the information used for the detection, then IDS systems can be further categorized into Host-based Intrusion Detection (HID) and Networkbased Intrusion Detection (NID). Host-based methods detect intrusions by examining data gathered from hosts, such as device memory, application logs [62,90,94,123,132,138,141], the change of system configuration [79], Network-based methods collect data from either a network, a hub or a router and detect anomalies at the source, destination, protocol and payload from network data [9,31,51,63,72,88,111,113,122]. Analysis-Centric: This category focuses on different analysis techniques for detecting outliers.…”
Section: Taxonomy Of Scada-based Idssmentioning
confidence: 99%
See 3 more Smart Citations
“…Information-Centric: If we examine the information used for the detection, then IDS systems can be further categorized into Host-based Intrusion Detection (HID) and Networkbased Intrusion Detection (NID). Host-based methods detect intrusions by examining data gathered from hosts, such as device memory, application logs [62,90,94,123,132,138,141], the change of system configuration [79], Network-based methods collect data from either a network, a hub or a router and detect anomalies at the source, destination, protocol and payload from network data [9,31,51,63,72,88,111,113,122]. Analysis-Centric: This category focuses on different analysis techniques for detecting outliers.…”
Section: Taxonomy Of Scada-based Idssmentioning
confidence: 99%
“…This system needs to be monitored at real-time. In [9], the traffic control data gathered from WSN (Wireless Sensor Network) is modeled using ARFIMA (Autoregressive Fractional Integrated Moving Average) technique, which analyzes the deviation between parameters of the network traffic and creates a statistical model for the system. The MLE (Maximum Likelihood Estimation) algorithm is used to detect the anomaly in this control system.…”
Section: Architectural Design Propertiesmentioning
confidence: 99%
See 2 more Smart Citations
“…The article by Andrysiak et al entitled "Network anomaly detection for railway critical infrastructure based on autoregressive fractional integrated moving average" [19] proposes a novel two-stage network traffic anomaly detection method for the railway transportation critical infrastructure monitored using wireless sensor networks.…”
Section: Other Issuesmentioning
confidence: 99%