Hunting Network Anomalies in a Railway Axle Counter System
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F23%3APU147889" target="_blank" >RIV/00216305:26220/23:PU147889 - isvavai.cz</a>
Výsledek na webu
<a href="https://www.mdpi.com/1424-8220/23/6/3122" target="_blank" >https://www.mdpi.com/1424-8220/23/6/3122</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.3390/s23063122" target="_blank" >10.3390/s23063122</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Hunting Network Anomalies in a Railway Axle Counter System
Popis výsledku v původním jazyce
This paper presents a comprehensive investigation of machine learning-based intrusion detection methods to reveal cyber attacks in railway axle counting networks. In contrast to the state-of-the-art works, our experimental results are validated with testbed-based real-world axle counting components. Furthermore, we aimed to detect targeted attacks on axle counting systems, which have higher impacts than conventional network attacks. W present a comprehensive investigation of machine learning-based intrusion detection methods to reveal cyber attacks in railway axle counting networks. According to our findings, the proposed machine learning-based models were able to categorize six different network states (normal and under attack). The overall accuracy of the initial models was ca. 70–100% for the test data set in laboratory conditions. In operational conditions, the accuracy decreased to under 50%. To increase the accuracy, we introduce a novel input data-preprocessing method with the denoted gamma parameter. This increased the accuracy of the deep neural network model to 69.52% for six labels, 85.11% for five labels, and 92.02% for two labels. The gamma parameter also removed the dependence on the time series, enabled relevant classification of data in the real network, and increased the accuracy of the model in real operations. This parameter is influenced by simulated attacks and, thus, allows the classification of traffic into specified classes.
Název v anglickém jazyce
Hunting Network Anomalies in a Railway Axle Counter System
Popis výsledku anglicky
This paper presents a comprehensive investigation of machine learning-based intrusion detection methods to reveal cyber attacks in railway axle counting networks. In contrast to the state-of-the-art works, our experimental results are validated with testbed-based real-world axle counting components. Furthermore, we aimed to detect targeted attacks on axle counting systems, which have higher impacts than conventional network attacks. W present a comprehensive investigation of machine learning-based intrusion detection methods to reveal cyber attacks in railway axle counting networks. According to our findings, the proposed machine learning-based models were able to categorize six different network states (normal and under attack). The overall accuracy of the initial models was ca. 70–100% for the test data set in laboratory conditions. In operational conditions, the accuracy decreased to under 50%. To increase the accuracy, we introduce a novel input data-preprocessing method with the denoted gamma parameter. This increased the accuracy of the deep neural network model to 69.52% for six labels, 85.11% for five labels, and 92.02% for two labels. The gamma parameter also removed the dependence on the time series, enabled relevant classification of data in the real network, and increased the accuracy of the model in real operations. This parameter is influenced by simulated attacks and, thus, allows the classification of traffic into specified classes.
Klasifikace
Druh
J<sub>imp</sub> - Článek v periodiku v databázi Web of Science
CEP obor
—
OECD FORD obor
20203 - Telecommunications
Návaznosti výsledku
Projekt
<a href="/cs/project/VJ02010016" target="_blank" >VJ02010016: Využití umělé inteligence pro zajištění kybernetické bezpečnosti Smart City</a><br>
Návaznosti
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Ostatní
Rok uplatnění
2023
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název periodika
SENSORS
ISSN
1424-8220
e-ISSN
1424-3210
Svazek periodika
23
Číslo periodika v rámci svazku
6
Stát vydavatele periodika
CH - Švýcarská konfederace
Počet stran výsledku
19
Strana od-do
1-19
Kód UT WoS článku
000958156800001
EID výsledku v databázi Scopus
2-s2.0-85151565738