Logo: to the web site of Uppsala University

uu.sePublications from Uppsala University
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Improve the Security of Industrial Control System: A Fine-Grained Classification Method for DoS Attacks on Modbus/TCP
Show others and affiliations
2023 (English)In: Mobile Networks and Applications, ISSN 1383-469X, E-ISSN 1572-8153, Vol. 28, no 2, p. 839-852Article in journal (Refereed) Published
Abstract [en]

With the rapid development of technology, more malicious traffic data brought negative influences on industrial areas. Modbus protocol plays a momentous role in the communications of Industrial Control Systems (ICS), but it’s vulnerable to Denial of Service attacks(DoS). Traditional detection methods cannot perform well on fine-grained detection tasks which could contribute to locating targets of attacks and preventing the destruction. Considering the temporal locality and high dimension of malicious traffic, this paper proposed a Neural Network architecture named MODLSTM, which consists of three parts: input preprocessing, feature recoding, and traffic classification. By virtue of the design, MODLSTM can form continuous stream semantics based on fragmented packets, discover potential low-dimensional features and finally classify traffic at a fine-grained level. To test the model’s performances, some experiments were conducted on industrial and public datasets, and the models achieved excellent performances in comparison with previous work(accuracy increased by 0.71% and 0.07% respectively). The results show that the proposed method has more satisfactory abilities to detect DoS attacks related to Modbus, compared with other works. It could help to build a reliable firewall to address a variety of malicious traffic in diverse situations, especially in industrial environments. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.

Place, publisher, year, edition, pages
Springer Nature, 2023. Vol. 28, no 2, p. 839-852
Keywords [en]
DDoS, Deep learning, DoS, Fine-grained classification, ICS, Modbus, Classification (of information), Integrated circuits, Intelligent control, Network architecture, Network security, Semantics, Classification methods, Denialof- service attacks, Fine grained, Industrial control systems, Malicious traffic, Performance, Denial-of-service attack
National Category
Computer Sciences Computer Systems
Identifiers
URN: urn:nbn:se:uu:diva-500252DOI: 10.1007/s11036-023-02108-8ISI: 000940761900002Scopus ID: 2-s2.0-85149041165OAI: oai:DiVA.org:uu-500252DiVA, id: diva2:1750621
Available from: 2023-04-13 Created: 2023-04-13 Last updated: 2025-02-20Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Lyu, Zhihan

Search in DiVA

By author/editor
Lyu, Zhihan
By organisation
Department of Game Design
In the same journal
Mobile Networks and Applications
Computer SciencesComputer Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 700 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf