Malicious Network Traffic in Industrial Control System

Citation Author(s):
Xiaoguang
Li
Haonan
Yan
Submitted by:
xg li
Last updated:
Thu, 05/30/2019 - 04:51
DOI:
10.21227/xwht-8v87
License:
863 Views
Categories:
0
0 ratings - Please login to submit your rating.

Abstract 

The malicious traffic detection system monitors the communication between the industrial equipment and analyzes the protocol in real time. At the same time, we launch a variety of attacks on the industrial system, such as Denial of Service attack, Man-in-the-Middle attack and so on. These attacks are also the major threat in the ICS currently. Then, we collect and classify different kinds of attack flow. These flows are intercepted from multiple collection stations during different periods.

Instructions: 
  • The original data sets contain normal industrial system traffic and several attack traffic.
  • The model training data sets are used to train a classification model for detecting malicious traffic.
  • The privacy test data sets mainly to determine whether the model can resist the model extraction attack.
  • The multi dimensional data sets are used to further examine the impact of privacy protection on model performance.

Comments

Useful

Submitted by Suvrima Datta on Mon, 03/07/2022 - 06:20