A Comprehensive IIoT Security Framework

DC Field Value Language
dc.contributor.advisor손태식-
dc.contributor.author김성진-
dc.date.accessioned2022-11-29T02:32:46Z-
dc.date.available2022-11-29T02:32:46Z-
dc.date.issued2021-08-
dc.identifier.other31136-
dc.identifier.urihttps://dspace.ajou.ac.kr/handle/2018.oak/20342-
dc.description학위논문(박사)--아주대학교 일반대학원 :컴퓨터공학과,2021. 8-
dc.description.tableofcontentsChapter 1 Introduction 1 1.1 Overall Framework 3 1.2 Contribution to the Field 5 1.3 Thesis outline 7 Chapter 2 Background 8 2.1 ICS changes by the 4th industrial revolution 9 2.2 Related works of fuzzing test for IIoT 14 2.3 Related works of intrusion detection for IIoT 16 Chapter 3 Black box Fuzzing Test for IIoT 18 3.1 Introduction 18 3.2 Field classification based fuzzing test case generation 21 3.3 Smart seed selection-based effective black box fuzzing 38 3.4 Discussion 53 Chapter 4 Deep learning based Anomaly Detection for IIoT 55 4.1 Introduction 55 4.2 Autoencoder Based Payload Anomaly Detection 58 4.3 Communication Pattern based Anomaly Detection 75 4.4 Discussion 98 Chapter 5. Conclusion 99 5.1 Summary 99 5.2 Future Work 101 5.3 Closing Remark 101-
dc.language.isoeng-
dc.publisherThe Graduate School, Ajou University-
dc.rights아주대학교 논문은 저작권에 의해 보호받습니다.-
dc.titleA Comprehensive IIoT Security Framework-
dc.typeThesis-
dc.contributor.affiliation아주대학교 일반대학원-
dc.contributor.alternativeNameSungJin Kim-
dc.contributor.department일반대학원 컴퓨터공학과-
dc.date.awarded2021. 8-
dc.description.degreeDoctoral-
dc.identifier.localId1227078-
dc.identifier.uciI804:41038-000000031136-
dc.identifier.urlhttps://dcoll.ajou.ac.kr/dcollection/common/orgView/000000031136-
dc.subject.keywordCPS-
dc.subject.keywordIIoT-
dc.subject.keywordsecurity-
dc.description.alternativeAbstractWith the advent of the Industrial Internet of Things (IIoT) era, industrial control systems have become more efficient to operate; however, it has caused the increase of risks of security accidents in field devices because the boundaries between each layer disappear and connection with the outside increase. ICS (Industrial Control System) ​has been suffered from advanced attacks such as APT (Advanced Persistent Threat) using zero-day vulnerabilities. To cope with the advanced attacks, it is necessary to apply vulnerability analysis and intrusion detection systems; however, since most industrial facilities are still operating without security considerations, security incidents are expected to continue. In this thesis, we propose a comprehensive security framework composed of proactive and reactive technologies for IIoT security to respond to attacks toward ICS. The proposed framework consists of two protocol vulnerability analysis methods and two abnormal behavior detection methods that can be applied to various environments using general ICS characteristics. In the case of the protocol vulnerability analysis technique, we propose a black box-based vulnerability analysis technique that can be performed for all protocol stacks. We verified the effectiveness of the proposed techniques through experiments with ICS communication protocols. In the case of anomaly detection techniques, we proposed two deep learning-based anomaly detection techniques that minimize the data analysis process so that it can be used even in small-scale factories and in various domains. We verified the effectiveness of these two techniques experimentally.-
dc.title.subtitleProactive Vulnerability Analysis and Reactive Anomaly Detection-
Appears in Collections:
Graduate School of Ajou University > Department of Computer Engineering > 4. Theses(Ph.D)
Files in This Item:
There are no files associated with this item.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Browse