博碩士論文 109522150 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:37 、訪客IP:18.218.79.100
姓名 林彥廷(Yan-Ting Lin)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 深度注意力殘差網路之工業控制系統基於流的異常分類
(Flow-based Anomaly Classification with Deep Attention Residual Network in Industrial Control System)
相關論文
★ 以IEEE 802.11為基礎行動隨意無線網路之混合式省電通訊協定★ 以范諾圖為基礎的對等式網路虛擬環境相鄰節點一致性研究
★ 行動隨意網路可調適及可延展之位置服務協定★ 同儕式網路虛擬環境高效率互動範圍群播
★ 巨量多人線上遊戲之同儕網路互動範圍語音交談★ 基於范諾圖之同儕式網路虛擬環境狀態管理
★ 利用多變量分析 之多人線上遊戲信任使用者選擇★ 無位置資訊無線感測網路之覆蓋及連通維持
★ 同儕網路虛擬環境3D串流同儕選擇策略★ 一個使用802.11與RFID技術的無所不在導覽系統U-Guide之設計與實作
★ 同儕式三維資料串流★ IM Finder: 透過即時通訊網路線上使用者找尋解答
★ 無位置資訊無線感測網路自走車有向天線導航與協調演算法★ 多匯點無線感測網路省能及流量分散事件輪廓追蹤
★ 頻寬感知同儕式3D串流★ 無線感測網路旋轉指向天線定位法
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 工業控制系統 (industrial control systems, ICS)結合資訊技術(information technology, IT)和運營技術 (operational technology, OT),透過網路以監視、控制和管理大型生產系統或關鍵基礎建設。工業控制系統一旦遭受資安攻擊,輕則系統性能下降、功能喪失,重則導致環境汙染、經濟損失、人員傷亡、甚至危害國家安全。因此,發展入侵偵測系統(intrusion detection system)及入侵分類系統(intrusion classification system),以檢測及分類資安攻擊所造成的異常(anomaly)變得非常重要。
本論文提出基於流 (flow-based)的異常分類方法,結合多重注意力區塊(multi-attention block)機制與殘差區塊 (residual block)機制建構深度神經網路以發展在工業控制系統中的入侵分類系統。所提出的方法首先透過匯集相同資料流(data flow)以獲得更多的特徵,接著使用多重注意力區塊提取在不同維度中的特徵,再使用殘差區塊導出輸入和輸出之間的殘差,以去除主體中相同的部分,從而突出微小的變化。為了增加訓練時的穩健性 (robustness),我們選擇 Ranger (RAdam + LookAhead)作為優化器來減少梯度的方差,選擇 Focal Loss作為損失函數為每個樣本給予相對應的損 失權重,以加強神經網路處理不平衡資料的能力。
本論文採用 Electra Modbus資料集來評估所提方法之效能,不僅將所提方法的不同機制組合進行效能比較,也與其他相關方法進行效能比較。比較結果顯示,所提方法在入侵分類方面,具有最好的精準度、召回率和 F1分數。
摘要(英) Industrial control systems (ICSs) combine information technology and operational technology to monitor, control and manage large-scale production systems or critical infrastructures through networking. Once industrial control systems suffer from information security attacks, their performance degrades and some functions may fail, leading to environmental pollution, economic losses, casualties, and even national security crises. Therefore, it is very important to develop an intrusion detection system and an intrusion classification system to detect and classify anomalies caused by information security attacks.
This thesis proposes a flow-based anomaly classification method that combines multi-attention blocks and residual blocks to construct deep neural networks (DNNs) for developing intrusion classification systems in ICSs. The proposed method first obtains more features through aggregating the same data flows. It then uses multi-attention blocks to extract features in different dimensions, and employs attention blocks to derive the residual between input and output for removing identical portions in the main body, and highlighting small changes. In order to increase the robustness during training, we choose Ranger (RAdam + LookAhead) as the optimizer to reduce the variance of the gradient, and choose Focal Loss as the loss function to give each sample a corresponding loss weight so that DNNs can process imbalanced data properly.
The Electra Modbus dataset is used to evaluate the performance of the proposed method for different combinations of mechanism options. The proposed method is also compared with other related methods in terms of the recison, recall and F1 score to show that it has the best performance.
關鍵字(中) ★ 工業控制系統
★ 異常分類
★ 基於流
★ 多重注意力區塊
★ 殘差區塊
★ Electra Modbus 資料集
關鍵字(英) ★ industrial control system
★ anomaly classification
★ flow-based
★ multi-attention block
★ residual block
★ Electra Modbus dataset
論文目次 中文摘要 .....................................................................................................................................i
Abstract ...................................................................................................................................... ii
誌謝 ........................................................................................................................................... iii
目錄 ........................................................................................................................................... iv
圖目錄 ....................................................................................................................................... vi
表目錄 ...................................................................................................................................... vii
一、 緒論 .............................................................................................................................. 1
1.1 研究背景與動機 ...................................................................................................... 1
1.2 研究目的與方法 ...................................................................................................... 2
1.3 論文架構 .................................................................................................................. 3
二、 背景知識與相關研究 .................................................................................................. 5
2.1 工業控制系統 ................................................................................................................ 5
2.1.1 監控與資料擷取 ..................................................................................................... 5
2.1.2 分散式控制系統 ..................................................................................................... 5
2.1.3 工業控制通訊協定 ................................................................................................. 5
2.2 異常檢測 ........................................................................................................................ 6
2.2.1 監督式異常檢測 ..................................................................................................... 6
2.2.2 半監督式異常檢測 ................................................................................................. 6
2.2.3 無監督式異常檢測 ................................................................................................. 7
2.3 神經網路 ........................................................................................................................ 7
2.3.1 人工神經網路 ......................................................................................................... 7
2.3.2 反向傳播演算法 ..................................................................................................... 9
2.4 深度學習 ........................................................................................................................ 9
2.4.1 殘差區塊 ................................................................................................................. 9
2.4.2 多重注意力區塊 ................................................................................................... 11
2.4.3 活化函數 ............................................................................................................... 12
2.4.4 權重初始化 ........................................................................................................... 13
2.4.5 損失函數 ............................................................................................................... 14
2.4.6 優化器 ................................................................................................................... 16
2.5 相關研究 ...................................................................................................................... 18
三、 研究方法 .................................................................................................................... 20
3.1 資料集 .......................................................................................................................... 20
3.2 異常攻擊標籤 .............................................................................................................. 21
3.3 研究方法介紹 .............................................................................................................. 22
3.3.1 研究方法流程架構 ............................................................................................... 22
3.3.2 資料前處理 ........................................................................................................... 23
3.3.3 建構模型 ............................................................................................................... 25
3.3.4 訓練模型 ............................................................................................................... 26
四、 實驗結果與分析 ........................................................................................................ 27
4.1 實驗環境 ...................................................................................................................... 27
4.2 評估標準 ...................................................................................................................... 27
4.3 實驗結果 ...................................................................................................................... 29
4.4 組合方法及相關研究文獻比較 .................................................................................. 30
五、 結論與未來展望 ........................................................................................................ 34
參考文獻 ................................................................................................................................. 35
參考文獻 [1] Zhou, C., Hu, B., Shi, Y., Tian, Y. C., Li, X., & Zhao, Y. (2020). A unified architectural approach for cyberattack-resilient industrial control systems. Proceedings of the IEEE, 109(4), 517-541.
[2] Goodfellow, I., Bengio, Y., Courville, A., & Bengio, Y. (2016). Deep learning (Vol. 1, No. 2). Cambridge: MIT press.
[3] LeCun, Y., Bottou, L., Bengio, Y., & Haffner, P. (1998). Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11), 2278-2324.
[4] Hochreiter, S., & Schmidhuber, J. (1997). Long short-term memory. Neural computation, 9(8), 1735-1780.
[5] Cho, K., Van Merriënboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., & Bengio, Y. (2014). Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078.
[6] Lin, T. Y., Goyal, P., Girshick, R., He, K., & Dollár, P. (2017). Focal loss for dense object detection. In Proceedings of the IEEE international conference on computer vision (pp. 2980-2988).
[7] Jiang, J. R., & Chen, Y. T. (2022). Industrial Control System Anomaly Detection and Classification Based on Network Traffic. IEEE Access.
[8] Gómez, Á. L. P., Maimó, L. F., Celdran, A. H., Clemente, F. J. G., Sarmiento, C. C., Masa, C. J. D. C., & Nistal, R. M. (2019). On the generation of anomaly detection datasets in industrial control systems. IEEE Access, 7, 177460-177473.
[9] Trend Labs 趨勢科技全球技術支援與研發中心:什麼是工業控制系統(Industrial Control System, ICS)。2022年6月5日,取自https://blog.trendmicro.com.tw/?p=67721。
[10] 台達:觸控型人機介面。2022年6月5日,取自https://www.deltaww.com/zh-tw/products/Touch-Panel-HMI-Human-Machine-Interfaces/ALL/
[11] 維基百科:遠端終端裝置。2022年6月5日,取自https://zh.wikipedia.org/zh-tw/%E8%BF%9C%E7%A8%8B%E7%BB%88%E7%AB%AF%E8%A3%85%E7%BD%AE
[12] 維基百科:可程式化邏輯控制器。2022年6月5日,取自https://zh.wikipedia.org/wiki/%E5%8F%AF%E7%BC%96%E7%A8%8B%E9%80%BB%E8%BE%91%E6%8E%A7%E5%88%B6%E5%99%A8
[13] Wikipedia:DNP3。2022年6月5日,取自https://en.wikipedia.org/wiki/DNP3
[14] Wikipedia:Modbus。2022年6月5日,取自https://zh.wikipedia.org/zh-tw/Modbus
[15] Wikipedia:OPC。2022年6月5日,取自https://zh.wikipedia.org/wiki/%E5%BC%80%E6%94%BE%E5%B9%B3%E5%8F%B0%E9%80%9A%E4%BF%A1
[16] Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58.
[17] Hodge, V., & Austin, J. (2004). A survey of outlier detection methodologies. Artificial intelligence review, 22(2), 85-126.
[18] Wikipedia:Artificial neural network。2022年6月5日,取自https://en.wikipedia.org/wiki/Artificial_neural_network
[19] Wikipedia:Neuron。2022年6月5日,取自https://en.wikipedia.org/wiki/Neuron
[20] He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 770-778).
[21] Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A. N., ... & Polosukhin, I. (2017). Attention is all you need. Advances in neural information processing systems, 30.
[22] Glorot, X., Bordes, A., & Bengio, Y. (2011, June). Deep sparse rectifier neural networks. In Proceedings of the fourteenth international conference on artificial intelligence and statistics (pp. 315-323). JMLR Workshop and Conference Proceedings.
[23] Hendrycks, D., & Gimpel, K. (2016). Gaussian error linear units (gelus). arXiv preprint arXiv:1606.08415.
[24] Dugas, C., Bengio, Y., Bélisle, F., Nadeau, C., & Garcia, R. (2000). Incorporating second-order functional knowledge for better option pricing. Advances in neural information processing systems, 13.
[25] Ramachandran, P., Zoph, B., & Le, Q. V. (2017). Searching for activation functions. arXiv preprint arXiv:1710.05941.
[26] Glorot, X., & Bengio, Y. (2010, March). Understanding the difficulty of training deep feedforward neural networks. In Proceedings of the thirteenth international conference on artificial intelligence and statistics (pp. 249-256). JMLR Workshop and Conference Proceedings.
[27] LeCun, Y. A., Bottou, L., Orr, G. B., & Müller, K. R. (2012). Efficient backprop. In Neural networks: Tricks of the trade (pp. 9-48). Springer, Berlin, Heidelberg.
[28] He, K., Zhang, X., Ren, S., & Sun, J. (2015). Delving deep into rectifiers: Surpassing human-level performance on imagenet classification. In Proceedings of the IEEE international conference on computer vision (pp. 1026-1034). [29] Wikipedia:Mean absolute error。2022年6月5日,取自https://en.wikipedia.org/wiki/Mean_absolute_error
[30] Wikipedia:Mean squared error。2022年6月5日,取自https://en.wikipedia.org/wiki/Mean_squared_error
[31] Wikipedia:Mean absolute percentage error。2022年6月5日,取自https://en.wikipedia.org/wiki/Mean_absolute_percentage_error
[32] Wikipedia:Cross entropy。2022年6月5日,取自https://en.wikipedia.org/wiki/Cross_entropy
[33] D. P. Kingma and J. Ba, ``Adam: A method for stochastic optimization,′′
2014, arXiv:1412.6980.
[34] Liu, L., Jiang, H., He, P., Chen, W., Liu, X., Gao, J., & Han, J. (2019). On the variance of the adaptive learning rate and beyond. arXiv preprint arXiv:1908.03265.
[35] Zhang, M. R., Lucas, J., Hinton, G., & Ba, J. (2019). Lookahead optimizer: k steps forward, 1 step back. arXiv preprint arXiv:1907.08610.
[36] Less Wright:New Deep Learning Optimizer, Ranger: Synergistic combination of RAdam + LookAhead for the best of both.。2022年6月5日,取自https://lessw.medium.com/new-deep-learning-optimizer-ranger-synergistic-combination-of-radam-lookahead-for-the-best-of-2dc83f79a48d
[37] Centre for Research in Cyber Security, iTrust (2021)。2022年6月5日,取自https://itrust.sutd.edu.sg/
[38] Mathur, A. P., & Tippenhauer, N. O. (2016, April). SWaT: a water treatment testbed for research and training on ICS security. In 2016 international workshop on cyber-physical systems for smart water networks (CySWater) (pp. 31-36). IEEE.
[39] Ahmed, C. M., Palleti, V. R., & Mathur, A. P. (2017, April). WADI: a water distribution testbed for research in the design of secure cyber physical systems. In Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks (pp. 25-28).
[40] Adepu, S., Kandasamy, N. K., & Mathur, A. (2018). Epic: An electric power testbed for research and training in cyber physical systems security. In Computer Security (pp. 37-52). Springer, Cham.
[41] Ning, B., Qiu, S., Zhao, T., & Li, Y. (2020, October). Power IoT attack samples generation and detection using generative adversarial networks. In 2020 IEEE 4th Conference on Energy Internet and Energy System Integration (EI2) (pp. 3721-3724). IEEE.
[42] Goodfellow, I. J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., ... & Bengio, Y. (2014). Generative adversarial networks. arXiv preprint arXiv:1406.2661.
指導教授 江振瑞(Jehn-Ruey Jiang) 審核日期 2022-7-26
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明