Hunting Network Anomalies in a Railway Axle Counter System
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F23%3APU147889" target="_blank" >RIV/00216305:26220/23:PU147889 - isvavai.cz</a>
Result on the web
<a href="https://www.mdpi.com/1424-8220/23/6/3122" target="_blank" >https://www.mdpi.com/1424-8220/23/6/3122</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.3390/s23063122" target="_blank" >10.3390/s23063122</a>
Alternative languages
Result language
angličtina
Original language name
Hunting Network Anomalies in a Railway Axle Counter System
Original language description
This paper presents a comprehensive investigation of machine learning-based intrusion detection methods to reveal cyber attacks in railway axle counting networks. In contrast to the state-of-the-art works, our experimental results are validated with testbed-based real-world axle counting components. Furthermore, we aimed to detect targeted attacks on axle counting systems, which have higher impacts than conventional network attacks. W present a comprehensive investigation of machine learning-based intrusion detection methods to reveal cyber attacks in railway axle counting networks. According to our findings, the proposed machine learning-based models were able to categorize six different network states (normal and under attack). The overall accuracy of the initial models was ca. 70–100% for the test data set in laboratory conditions. In operational conditions, the accuracy decreased to under 50%. To increase the accuracy, we introduce a novel input data-preprocessing method with the denoted gamma parameter. This increased the accuracy of the deep neural network model to 69.52% for six labels, 85.11% for five labels, and 92.02% for two labels. The gamma parameter also removed the dependence on the time series, enabled relevant classification of data in the real network, and increased the accuracy of the model in real operations. This parameter is influenced by simulated attacks and, thus, allows the classification of traffic into specified classes.
Czech name
—
Czech description
—
Classification
Type
J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database
CEP classification
—
OECD FORD branch
20203 - Telecommunications
Result continuities
Project
<a href="/en/project/VJ02010016" target="_blank" >VJ02010016: Application of Artificial Intelligence for Ensuring Cyber Security for Smart City</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2023
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
SENSORS
ISSN
1424-8220
e-ISSN
1424-3210
Volume of the periodical
23
Issue of the periodical within the volume
6
Country of publishing house
CH - SWITZERLAND
Number of pages
19
Pages from-to
1-19
UT code for WoS article
000958156800001
EID of the result in the Scopus database
2-s2.0-85151565738