4.5 Article

A Continuous Terminal Sliding-Mode Observer-Based Anomaly Detection Approach for Industrial Communication Networks

期刊

SYMMETRY-BASEL
卷 14, 期 1, 页码 -

出版社

MDPI
DOI: 10.3390/sym14010124

关键词

network traffic monitoring; sliding-mode observers; industrial switches; industrial communication network; TCP; IP; DDoS attacks; anomaly detection

资金

  1. National Natural Science Foundation of China [62003086]
  2. Shanghai Pujiang Program [21PJ1422000]
  3. Guangdong Basic and Applied Basic Research Foundation [2020A1515110148]
  4. Heilongjiang Industrial Revitalization Major Project on Engineering and Science [2019ZX02A01]

向作者/读者索取更多资源

This paper proposes a method for dynamic traffic monitoring in industrial communication networks using a dynamic fluid-flow model. The method utilizes a continuous terminal sliding-mode observer and a full-order sliding-mode mechanism for real-time estimation of traffic anomalies. The effectiveness of the method is demonstrated through experiments.
Dynamic traffic monitoring is a critical part of industrial communication network cybersecurity, which can be used to analyze traffic behavior and identify anomalies. In this paper, industrial networks are modeled by a dynamic fluid-flow model of TCP behavior. The model can be described as a class of systems with unmeasurable states. In the system, anomalies and normal variants are represented by the queuing dynamics of additional traffic flow (ATF) and can be considered as a disturbance. The novel contributions are described as follows: (1) a novel continuous terminal sliding-mode observer (TSMO) is proposed for such systems to estimate the disturbance for traffic monitoring; (2) in TSMO, a novel output injection strategy is proposed using the finite-time stability theory to speed up convergence of the internal dynamics; and (3) a full-order sliding-mode-based mechanism is developed to generate a smooth output injection signal for real-time estimations, which is directly used for anomaly detection. To verify the effectiveness of the proposed approach, the real traffic profiles from the Center for Applied Internet Data Analysis (CAIDA) DDoS attack datasets are used.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据