Skip to main content

Application of Kohonen Maps to Improve Security Tests on Automation Devices

  • Conference paper
Critical Information Infrastructures Security (CRITIS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5141))

Abstract

We propose a new method to improve the effectiveness of security tests on industrial automation devices. Using a self-organizing neural network, we are able to build a Kohonen map that organizes operating systems according to similarities of their TCP/IP fingerprints. Our technique enables us to associate specific security tests to regions of the Kohonen map and to use this information to improve protection of automation devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dzung, D., Naedele, M., Hoff, T.P.V., Crevatin, M.: Security for Industrial Communication Systems. Proceedings of the IEEE 93(6) (2005)

    Google Scholar 

  2. Pires, P.S.M., Oliveira, L.A.G.: Security Aspects of SCADA and Corporate Network Interconnection: An Overview. In: Proceedings of International Conference on Dependability of Computer Systems, DepCoS RELCOMEX, Szklarska Poreba, Poland, pp. 127–134 (2006)

    Google Scholar 

  3. Creery, A., Byres, E.J.: Industrial Cybersecurity for Power System and SCADA Networks. In: Industry Applications Society 52nd Annual Petroleum and Chemical Industry Conference, pp. 303–309 (2005)

    Google Scholar 

  4. Kohonen, T.: Self-Organization and Associative Memory, 3rd edn. Springer, New York (1989)

    Google Scholar 

  5. Fyodor: Network Mapper (2008), http://nmap.org

  6. Fyodor: Remote OS detection via TCP/IP Stack Fingerprinting. Phrack Magazine 8(54) (1998)

    Google Scholar 

  7. Fyodor: Remote OS Detection via TCP/IP Fingerprinting (2nd Generation) (2006), http://nmap.org/osdetect

  8. Haykin, S.: Neural Networks: A Comprehensive Foundation, 2nd edn. Prentice-Hall, New Jersey (1999)

    MATH  Google Scholar 

  9. Oja, M., Kaski, S., Kohonen, T.: Bibliography of Self-Organizing Map (SOM) Papers: 1998-2001 addendum. Neural Computing Surveys 3(1), 1–156 (2003)

    Google Scholar 

  10. Medeiros, J.P.S., Cunha, A.C., Brito Jr., A.M., Pires, P.S.M.: Automating Security Tests for Industrial Automation Devices Using Neural Networks. In: Proceedings of the 12th IEEE Conference on Emerging Technologies and Factory Automation, ETFA, Patras, Greece (2007)

    Google Scholar 

  11. Brito Jr., A.M., Neto, A.D.D., Melo, J.D.: Surface Reconstruction Using Neural Networks and Adaptive Geometry Meshes. In: Proceedings of the International Joint Conference on Neural Networks, Budapest, Hungary (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Medeiros, J.P.S., Cunha, A.C., Brito, A.M., Motta Pires, P.S. (2008). Application of Kohonen Maps to Improve Security Tests on Automation Devices. In: Lopez, J., Hämmerli, B.M. (eds) Critical Information Infrastructures Security. CRITIS 2007. Lecture Notes in Computer Science, vol 5141. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89173-4_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89173-4_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89095-9

  • Online ISBN: 978-3-540-89173-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics