Abstract

With the current global food production capability, it is not difficult to anticipate that there will be a global food shortage when the world population grows beyond 10 billion by the end of the 21st century. Many projects are in motion to deal with this problem and some of them are considered to be quite feasible. Development and implementation of smart green houses and vertical farms are two major solutions for the expected crisis, but as other ICT-based systems, their security problems must be dealt with. Nevertheless, current network forensics is still unable to fully monitor and analyze computer network traffic to gather the evidences of malicious attacks or intrusions. Although major companies and government agencies have introduced various types of high-speed IDS into their networks, smaller firms or private organizations are unable to do so because of the cost involved. The lightweight IDS proposed in this study can be a suitable solution as this system can be operated with a common PC and peripherals. This system also underwent a test bed experiment and proved its efficiency. Jpcap library was used to capture transport packets which were then classified using typical communications protocols. The packet headers were subjected to analysis and the results were stored in database for later applications.

Highlights

  • The early industrial automation systems that had used some type of information technology (IT) were relatively safe from external cyberattacks as they were independently constructed and separated from outside environments

  • Java language was used for the development of lightweight intrusion detection system (LIDS) because of its adaptability and universality as a programming language

  • The malicious packets or codes were detected by analyzing the abnormalities in the data collected and stored in the databases and the attacking incidents were notified to the user

Read more

Summary

Introduction

The early industrial automation systems that had used some type of information technology (IT) were relatively safe from external cyberattacks as they were independently constructed and separated from outside environments. Most of the industrial automation systems have become more sophisticated and complex; they need to be controlled and monitored by the systems within the manufacturing sites and other operation management system(s) from outside remotely. While the efficiency of such automation systems may have increased, the chance of cyberattacks from domestic and foreign organizations or hackers has increased so much that some of the control system research organizations in the Republic of Korea (ROK) have established a security guideline for them. International Journal of Distributed Sensor Networks this system model uses an open-source Jpcap library to capture transport packets, instead of developing any exclusive programs separately

Related works
25 June 2013
Result
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call