Detail View

Automated Identification of ICS Topology and Device Types via Protocol-Agnostic Passive Monitoring
Citations

WEB OF SCIENCE

Citations

SCOPUS

Metadata Downloads

DC Field Value Language
dc.contributor.author Heo, Wonje -
dc.contributor.author Shin, Donghoon -
dc.date.accessioned 2025-12-24T13:40:11Z -
dc.date.available 2025-12-24T13:40:11Z -
dc.date.created 2025-10-30 -
dc.date.issued 2025-12 -
dc.identifier.issn 2372-2541 -
dc.identifier.uri https://scholar.dgist.ac.kr/handle/20.500.11750/59279 -
dc.description.abstract Industrial Control Systems (ICS) are increasingly targeted by sophisticated cyber threats, yet many deployments still lack accurate device documentation and comprehensive visibility across segmented environments. Legacy heterogeneity and strict uptime constraints limit traditional asset discovery and segmentation validation. This paper proposes a protocol-agnostic framework for automatically reconstructing ICS hierarchies and identifying device types from passively captured network traffic. The method first infers structural layers by analyzing Strongly Connected Components (SCC) and betweenness centrality in a directed communication graph. It then refines device classification by transforming network flows into byte-sequence images - combining raw bytes, Gramian Angular Fields (GAF), and Markov Transition Fields (MTF) - and clustering them based on communication behavior. A supervised encoder trained on known types guides a mimicry-based model, enabling scalable and label-efficient inference. Experiments on ICSSIM and SWaT validate accurate topology recovery and semi-supervised, label-efficient device-type clustering. Temporal views (GAF, MTF) improve stability over raw bytes alone, and the mimicry model is robust to label scarcity and operational noise, achieving mean Adjusted Rand Index (ARI) 0:954 ± 0:015, Normalized Mutual Information (NMI) 0:953 ± 0:012, and silhouette 0:837 ± 0:039 across folds and label splits. The framework delivers scalable, interpretable ICS visibility without active probing or protocol parsers, and the attacker-injection study shows adversarial paths highlighted without spurious cross-layer links, providing a practical foundation for behavior-aware anomaly/threat detection. -
dc.language English -
dc.publisher Institute of Electrical and Electronics Engineers -
dc.title Automated Identification of ICS Topology and Device Types via Protocol-Agnostic Passive Monitoring -
dc.type Article -
dc.identifier.doi 10.1109/JIOT.2025.3623634 -
dc.identifier.scopusid 2-s2.0-105019347169 -
dc.identifier.bibliographicCitation IEEE Internet of Things Journal, v.12, no.24, pp.55525 - 55538 -
dc.description.isOpenAccess FALSE -
dc.subject.keywordAuthor protocol-agnostic -
dc.subject.keywordAuthor Asset discovery -
dc.subject.keywordAuthor industrial control systems (ICSs) -
dc.subject.keywordAuthor network visibility -
dc.subject.keywordAuthor passive monitoring -
dc.citation.endPage 55538 -
dc.citation.number 24 -
dc.citation.startPage 55525 -
dc.citation.title IEEE Internet of Things Journal -
dc.citation.volume 12 -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.type.docType Article -
Show Simple Item Record

File Downloads

  • There are no files associated with this item.

공유

qrcode
공유하기

Related Researcher

신동훈
Shin, Donghoon신동훈

Department of Electrical Engineering and Computer Science

read more

Total Views & Downloads