Hunting Network Anomalies in a Railway Axle Counter System
dc.contributor.author | Kuchař, Karel | cs |
dc.contributor.author | Holasová, Eva | cs |
dc.contributor.author | Pospíšil, Ondřej | cs |
dc.contributor.author | Ruotsalainen, Henri | cs |
dc.contributor.author | Fujdiak, Radek | cs |
dc.contributor.author | Wagner, Adrian | cs |
dc.coverage.issue | 6 | cs |
dc.coverage.volume | 23 | cs |
dc.date.accessioned | 2023-07-21T06:53:45Z | |
dc.date.available | 2023-07-21T06:53:45Z | |
dc.date.issued | 2023-03-14 | cs |
dc.description.abstract | This paper presents a comprehensive investigation of machine learning-based intrusion detection methods to reveal cyber attacks in railway axle counting networks. In contrast to the state-of-the-art works, our experimental results are validated with testbed-based real-world axle counting components. Furthermore, we aimed to detect targeted attacks on axle counting systems, which have higher impacts than conventional network attacks. W present a comprehensive investigation of machine learning-based intrusion detection methods to reveal cyber attacks in railway axle counting networks. According to our findings, the proposed machine learning-based models were able to categorize six different network states (normal and under attack). The overall accuracy of the initial models was ca. 70–100% for the test data set in laboratory conditions. In operational conditions, the accuracy decreased to under 50%. To increase the accuracy, we introduce a novel input data-preprocessing method with the denoted gamma parameter. This increased the accuracy of the deep neural network model to 69.52% for six labels, 85.11% for five labels, and 92.02% for two labels. The gamma parameter also removed the dependence on the time series, enabled relevant classification of data in the real network, and increased the accuracy of the model in real operations. This parameter is influenced by simulated attacks and, thus, allows the classification of traffic into specified classes. | en |
dc.format | text | cs |
dc.format.extent | 1-19 | cs |
dc.format.mimetype | application/pdf | cs |
dc.identifier.citation | SENSORS. 2023, vol. 23, issue 6, p. 1-19. | en |
dc.identifier.doi | 10.3390/s23063122 | cs |
dc.identifier.issn | 1424-8220 | cs |
dc.identifier.orcid | 0000-0002-5972-9037 | cs |
dc.identifier.orcid | 0000-0002-5584-2948 | cs |
dc.identifier.orcid | 0000-0002-8347-4847 | cs |
dc.identifier.orcid | 0000-0002-8319-0633 | cs |
dc.identifier.other | 183121 | cs |
dc.identifier.researcherid | ABG-4089-2020 | cs |
dc.identifier.researcherid | ABG-5140-2020 | cs |
dc.identifier.scopus | 56610269000 | cs |
dc.identifier.uri | http://hdl.handle.net/11012/213556 | |
dc.language.iso | en | cs |
dc.publisher | MDPI | cs |
dc.relation.ispartof | SENSORS | cs |
dc.relation.uri | https://www.mdpi.com/1424-8220/23/6/3122 | cs |
dc.rights | Creative Commons Attribution 4.0 International | cs |
dc.rights.access | openAccess | cs |
dc.rights.sherpa | http://www.sherpa.ac.uk/romeo/issn/1424-8220/ | cs |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | cs |
dc.subject | attack classification | en |
dc.subject | axle counter | en |
dc.subject | feature selection | en |
dc.subject | ICS | en |
dc.subject | neural network | en |
dc.subject | OT | en |
dc.subject | railway | en |
dc.subject | testbed threat | en |
dc.title | Hunting Network Anomalies in a Railway Axle Counter System | en |
dc.type.driver | article | en |
dc.type.status | Peer-reviewed | en |
dc.type.version | publishedVersion | en |
sync.item.dbid | VAV-183121 | en |
sync.item.dbtype | VAV | en |
sync.item.insts | 2023.08.09 16:54:40 | en |
sync.item.modts | 2023.08.09 16:16:14 | en |
thesis.grantor | Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií. Ústav telekomunikací | cs |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- sensors2303122v2.pdf
- Size:
- 763.49 KB
- Format:
- Adobe Portable Document Format
- Description:
- sensors2303122v2.pdf