WEB OF SCIENCE
SCOPUS
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Heo, Wonje | - |
| dc.contributor.author | Shin, Donghoon | - |
| dc.date.accessioned | 2025-12-24T13:40:11Z | - |
| dc.date.available | 2025-12-24T13:40:11Z | - |
| dc.date.created | 2025-10-30 | - |
| dc.date.issued | 2025-12 | - |
| dc.identifier.issn | 2372-2541 | - |
| dc.identifier.uri | https://scholar.dgist.ac.kr/handle/20.500.11750/59279 | - |
| dc.description.abstract | Industrial Control Systems (ICS) are increasingly targeted by sophisticated cyber threats, yet many deployments still lack accurate device documentation and comprehensive visibility across segmented environments. Legacy heterogeneity and strict uptime constraints limit traditional asset discovery and segmentation validation. This paper proposes a protocol-agnostic framework for automatically reconstructing ICS hierarchies and identifying device types from passively captured network traffic. The method first infers structural layers by analyzing Strongly Connected Components (SCC) and betweenness centrality in a directed communication graph. It then refines device classification by transforming network flows into byte-sequence images - combining raw bytes, Gramian Angular Fields (GAF), and Markov Transition Fields (MTF) - and clustering them based on communication behavior. A supervised encoder trained on known types guides a mimicry-based model, enabling scalable and label-efficient inference. Experiments on ICSSIM and SWaT validate accurate topology recovery and semi-supervised, label-efficient device-type clustering. Temporal views (GAF, MTF) improve stability over raw bytes alone, and the mimicry model is robust to label scarcity and operational noise, achieving mean Adjusted Rand Index (ARI) 0:954 ± 0:015, Normalized Mutual Information (NMI) 0:953 ± 0:012, and silhouette 0:837 ± 0:039 across folds and label splits. The framework delivers scalable, interpretable ICS visibility without active probing or protocol parsers, and the attacker-injection study shows adversarial paths highlighted without spurious cross-layer links, providing a practical foundation for behavior-aware anomaly/threat detection. | - |
| dc.language | English | - |
| dc.publisher | Institute of Electrical and Electronics Engineers | - |
| dc.title | Automated Identification of ICS Topology and Device Types via Protocol-Agnostic Passive Monitoring | - |
| dc.type | Article | - |
| dc.identifier.doi | 10.1109/JIOT.2025.3623634 | - |
| dc.identifier.scopusid | 2-s2.0-105019347169 | - |
| dc.identifier.bibliographicCitation | IEEE Internet of Things Journal, v.12, no.24, pp.55525 - 55538 | - |
| dc.description.isOpenAccess | FALSE | - |
| dc.subject.keywordAuthor | protocol-agnostic | - |
| dc.subject.keywordAuthor | Asset discovery | - |
| dc.subject.keywordAuthor | industrial control systems (ICSs) | - |
| dc.subject.keywordAuthor | network visibility | - |
| dc.subject.keywordAuthor | passive monitoring | - |
| dc.citation.endPage | 55538 | - |
| dc.citation.number | 24 | - |
| dc.citation.startPage | 55525 | - |
| dc.citation.title | IEEE Internet of Things Journal | - |
| dc.citation.volume | 12 | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.type.docType | Article | - |
Department of Electrical Engineering and Computer Science