Skip to main content

Anomaly Detection in Industrial Networks using Machine Learning: A Roadmap

  • Conference paper
  • First Online:
Machine Learning for Cyber Physical Systems

Part of the book series: Technologien für die intelligente Automation ((TIA))

  • 2423 Accesses

Abstract

With the advent of 21st Century, we stepped into the fourth industrial revolution of cyber physical systems. There is the need of secured network systems and intrusion detection systems in order to detect network attacks. Use of machine learning for anomaly detection in industrial networks faces challenges which restricts its large-scale commercial deployment. ADIN Suite proposes a roadmap to overcome these challenges with multi-module solution. It solves the need for real world network traffic, an adaptive hybrid analysis to reduce error rates in diverse network traffic and alarm correlation for semantic description of detection results to the network operator.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Platform Industrie 4.0. Cooperation between plattform industrie 4.0 and industrial internet consortium. 2016.

    Google Scholar 

  2. Platform Industrie 4.0. Network-based communication for industrie 4.0. Discussion paper, Federal Ministry for Economic Affairs and Energy (BMWi), Germany, 2016.

    Google Scholar 

  3. Dzung, Dacfey and Naedele, Martin and Von Hoff, Thomas P and Crevatin, Mario. Security for industrial communication systems. Proceedings of the IEEE, 93(6):1152-1177, 2005.

    Google Scholar 

  4. Knapp, Eric D and Langill, Joel Thomas. Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress, 2014.

    Google Scholar 

  5. Brendan Galloway and Gerhard P Hancke. Introduction to industrial control networks. IEEE Communications surveys & tutorials, 15(2):860–880.

    Google Scholar 

  6. Scarfone, Karen and Mell, Peter. Guide to intrusion detection and prevention systems (idps). NIST special publication, 800(2007):94, 2007.

    Google Scholar 

  7. Buczak, Anna L and Guven, Erhan. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2):1153-1176, 2015.

    Google Scholar 

  8. Chandola, Varun and Banerjee, Arindam and Kumar, Vipin. Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3):15, 2009.

    Google Scholar 

  9. Patcha, Animesh and Park, Jung-Min. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer networks, 51(12):3448–3470, 2007.

    Google Scholar 

  10. Sommer, Robin and Paxson, Vern. Outside the closed world: On using machine learning for network intrusion detection. In 2010 IEEE symposium on security and privacy, pages 305-316. IEEE, 2010.

    Google Scholar 

  11. Dorothy E. Denning. An intrusion-detection model. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 13(2):222–232, 1987.

    Google Scholar 

  12. Lippmann, Richard and Haines, Joshua W and Fried, David J and Korba, Jonathan and Das, Kumar. The 1999 darpa on-line intrusion detection evaluation. Computer networks, 34(4):579-595, 2000.

    Google Scholar 

  13. KDD Cup. Dataset. available at the following website http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, 1999.

  14. Tavallaee, Mahbod and Bagheri, Ebrahim and Lu, Wei and Ghorbani, Ali-A. A detailed analysis of the kdd cup 99 data set. In Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications 2009, 2009.

    Google Scholar 

  15. Pfrang, S. and Kippe, J. and Meier, D. and Haas, C. Design and Architecture of an Industrial IT Security Lab. In TRIDENTCOM 2016 - Proceedings of the 11th International Conference on Testbeds and research infrastructures for the development of networks & communities (to appear), 2016.

    Google Scholar 

  16. Ahonen, Pasi. Constructing network security monitoring systems. Vtt Research Notes, 2011.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ankush Meshram .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer-Verlag GmbH Germany

About this paper

Cite this paper

Meshram, A., Haas, C. (2017). Anomaly Detection in Industrial Networks using Machine Learning: A Roadmap. In: Beyerer, J., Niggemann, O., Kühnert, C. (eds) Machine Learning for Cyber Physical Systems. Technologien für die intelligente Automation. Springer Vieweg, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-53806-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-53806-7_8

  • Published:

  • Publisher Name: Springer Vieweg, Berlin, Heidelberg

  • Print ISBN: 978-3-662-53805-0

  • Online ISBN: 978-3-662-53806-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics