{"id":"https://openalex.org/W4379619885","doi":"https://doi.org/10.1109/wfcs57264.2023.10144114","title":"Attacker Localization with Machine Learning in RS-485 Industrial Control Networks","display_name":"Attacker Localization with Machine Learning in RS-485 Industrial Control Networks","publication_year":2023,"publication_date":"2023-04-26","ids":{"openalex":"https://openalex.org/W4379619885","doi":"https://doi.org/10.1109/wfcs57264.2023.10144114"},"language":"en","primary_location":{"id":"doi:10.1109/wfcs57264.2023.10144114","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wfcs57264.2023.10144114","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045456657","display_name":"Hideya Ochiai","orcid":"https://orcid.org/0000-0002-4568-6726"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Hideya Ochiai","raw_affiliation_strings":["The University of Tokyo"],"affiliations":[{"raw_affiliation_string":"The University of Tokyo","institution_ids":["https://openalex.org/I74801974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012836895","display_name":"Md Delwar Hossain","orcid":"https://orcid.org/0000-0002-5968-0704"},"institutions":[{"id":"https://openalex.org/I75917431","display_name":"Nara Institute of Science and Technology","ror":"https://ror.org/05bhada84","country_code":"JP","type":"education","lineage":["https://openalex.org/I75917431"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Md Delwar Hossain","raw_affiliation_strings":["Nara Institute of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Nara Institute of Science and Technology","institution_ids":["https://openalex.org/I75917431"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084740320","display_name":"Youki Kadobayashi","orcid":null},"institutions":[{"id":"https://openalex.org/I75917431","display_name":"Nara Institute of Science and Technology","ror":"https://ror.org/05bhada84","country_code":"JP","type":"education","lineage":["https://openalex.org/I75917431"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Youki Kadobayashi","raw_affiliation_strings":["Nara Institute of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Nara Institute of Science and Technology","institution_ids":["https://openalex.org/I75917431"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052106822","display_name":"Hiroshi Esaki","orcid":"https://orcid.org/0000-0001-5657-9216"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroshi Esaki","raw_affiliation_strings":["The University of Tokyo"],"affiliations":[{"raw_affiliation_string":"The University of Tokyo","institution_ids":["https://openalex.org/I74801974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5045456657"],"corresponding_institution_ids":["https://openalex.org/I74801974"],"apc_list":null,"apc_paid":null,"fwci":0.2009,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.46883147,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7494827508926392},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7145165801048279},{"id":"https://openalex.org/keywords/downtime","display_name":"Downtime","score":0.6103954315185547},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5255928039550781},{"id":"https://openalex.org/keywords/command-and-control","display_name":"Command and control","score":0.4854469895362854},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4217904508113861},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4203081727027893},{"id":"https://openalex.org/keywords/normalization","display_name":"Normalization (sociology)","score":0.4129171073436737},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4018406867980957},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.37642186880111694},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3441648483276367},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34363681077957153},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3069383203983307},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12945157289505005},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11023622751235962}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7494827508926392},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7145165801048279},{"id":"https://openalex.org/C180591934","wikidata":"https://www.wikidata.org/wiki/Q1253369","display_name":"Downtime","level":2,"score":0.6103954315185547},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5255928039550781},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.4854469895362854},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4217904508113861},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4203081727027893},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.4129171073436737},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4018406867980957},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37642186880111694},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3441648483276367},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34363681077957153},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3069383203983307},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12945157289505005},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11023622751235962},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wfcs57264.2023.10144114","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wfcs57264.2023.10144114","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.4300000071525574,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321034","display_name":"New Energy and Industrial Technology Development Organization","ror":"https://ror.org/0055k7a87"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W195047088","https://openalex.org/W1991510770","https://openalex.org/W2407991977","https://openalex.org/W2806099304","https://openalex.org/W2959120033","https://openalex.org/W3092232275","https://openalex.org/W3105105644","https://openalex.org/W3213338431","https://openalex.org/W4304820458","https://openalex.org/W4312402222","https://openalex.org/W6803992590"],"related_works":["https://openalex.org/W4289382619","https://openalex.org/W4283702202","https://openalex.org/W2908486505","https://openalex.org/W4285787111","https://openalex.org/W2962417627","https://openalex.org/W2971973266","https://openalex.org/W4224288713","https://openalex.org/W2977342517","https://openalex.org/W4327782917","https://openalex.org/W1661835657"],"abstract_inverted_index":{"Cyber-attacks":[0],"on":[1,108],"industrial":[2],"control":[3],"systems":[4],"(ICSs)":[5],"may":[6,58],"cause":[7],"huge":[8,61],"damage":[9],"to":[10,46],"our":[11,14],"society":[12],"and":[13,48,91,97,113],"lives.":[15],"RS-485":[16,33,73,177],"is":[17],"a":[18,27,60,79,105,109],"backbone":[19],"network":[20,34,54],"for":[21,72,82,95,172],"many":[22],"ICSs":[23],"deployed":[24],"worldwide":[25],"as":[26],"standard.":[28],"Attack":[29],"detection":[30],"in":[31,38,52,147,176],"the":[32,39,42,50,53,64,84,88,99,120,129,132,148,155,174],"has":[35],"been":[36],"studied":[37],"past.":[40],"However,":[41],"operator":[43],"still":[44,169],"needs":[45],"identify":[47],"eliminate":[49],"attacker":[51,69,133,145,163,175],"after":[55],"detected,":[56],"which":[57,166],"require":[59],"downtime":[62],"of":[63,87,131],"system.":[65],"We":[66,101],"propose":[67],"an":[68,123],"localization":[70,117],"framework":[71,76],"networks.":[74],"This":[75],"uses":[77],"(1)":[78],"current":[80],"transformer":[81],"monitoring":[83],"analog":[85],"signals":[86],"communication":[89],"line":[90],"(2)":[92],"machine":[93],"learning":[94],"detecting":[96],"localizing":[98],"attacker.":[100],"have":[102],"carried":[103],"out":[104],"performance":[106],"evaluation":[107],"200-meter":[110],"scale":[111],"testbed":[112],"found":[114],"that":[115],"regression-based":[116],"model":[118],"performed":[119],"best":[121],"with":[122,134,157,160],"averaging":[124],"aggregator.":[125],"It":[126,151],"could":[127,140,152],"estimate":[128,154],"location":[130,156],"about":[135],"100%":[136],"accuracy":[137,159],"if":[138],"we":[139],"obtain":[141],"6":[142],"or":[143],"10":[144],"points":[146],"training":[149,164],"dataset.":[150],"also":[153],"93%-96%":[158],"only":[161],"4":[162],"points,":[165],"would":[167],"be":[168],"practically":[170],"useful":[171],"finding":[173],"network.":[178]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
