PlumX Metrics
Embed PlumX Metrics

Machine Learning Algorithms for Identifying Dependencies in OT Protocols

Energies, ISSN: 1996-1073, Vol: 16, Issue: 10
2023
  • 0
    Citations
  • 0
    Usage
  • 14
    Captures
  • 2
    Mentions
  • 14
    Social Media
Metric Options:   Counts1 Year3 Year

Metrics Details

  • Captures
    14
  • Mentions
    2
    • Blog Mentions
      1
      • 1
    • News Mentions
      1
      • 1
  • Social Media
    14
    • Shares, Likes & Comments
      14
      • Facebook
        14

Most Recent Blog

Energies, Vol. 16, Pages 4056: Machine Learning Algorithms for Identifying Dependencies in OT Protocols

Energies, Vol. 16, Pages 4056: Machine Learning Algorithms for Identifying Dependencies in OT Protocols Energies doi: 10.3390/en16104056 Authors: Milosz Smolarczyk Jakub Pawluk Alicja Kotyla Sebastian

Most Recent News

Study Findings from St. Petersburg Broaden Understanding of Machine Learning (Machine Learning Algorithms for Identifying Dependencies in OT Protocols)

2023 MAY 31 (NewsRx) -- By a News Reporter-Staff News Editor at Robotics & Machine Learning Daily News -- Investigators discuss new findings in artificial

Article Description

This study illustrates the utility and effectiveness of machine learning algorithms in identifying dependencies in data transmitted in industrial networks. The analysis was performed for two different algorithms. The study was carried out for the XGBoost (Extreme Gradient Boosting) algorithm based on a set of decision tree model classifiers, and the second algorithm tested was the EBM (Explainable Boosting Machines), which belongs to the class of Generalized Additive Models (GAM). Tests were conducted for several test scenarios. Simulated data from static equations were used, as were data from a simulator described by dynamic differential equations, and the final one used data from an actual physical laboratory bench connected via Modbus TCP/IP. Experimental results of both techniques are presented, thus demonstrating the effectiveness of the algorithms. The results show the strength of the algorithms studied, especially against static data. For dynamic data, the results are worse, but still at a level that allows using the researched methods to identify dependencies. The algorithms presented in this paper were used as a passive protection layer of a commercial IDS (Intrusion Detection System).

Bibliographic Details

Milosz Smolarczyk; Jakub Pawluk; Alicja Kotyla; Katarzyna Kaminska; Krzysztof Szczypiorski; Sebastian Plamowski

MDPI AG

Energy; Engineering; Mathematics

Provide Feedback

Have ideas for a new metric? Would you like to see something else here?Let us know