MIT Libraries logoDSpace@MIT

MIT
View Item 
  • DSpace@MIT Home
  • MIT Libraries
  • MIT Theses
  • Graduate Theses
  • View Item
  • DSpace@MIT Home
  • MIT Libraries
  • MIT Theses
  • Graduate Theses
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Evaluating effectiveness of an embedded system endpoint security technology on energy delivery systems

Author(s)
Chu, Weilian.
Thumbnail
Download1098171923-MIT.pdf (6.952Mb)
Other Contributors
Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science.
Advisor
Michael Siegel.
Terms of use
MIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission. http://dspace.mit.edu/handle/1721.1/7582
Metadata
Show full item record
Abstract
The Internet of Things (IoT) is starting to take off in the modern day tech scene, with almost every user device being connected to a huge network with other devices; industrial energy delivery systems are no different. However, IoT in industry (known as IIoT) severely lags behind conventional IoT networks when it comes to cybersecurity, as IIoT endpoint devices generally lack the same level of memory and computation as conventional IoT endpoints. As a result, the same level of security measurements can't be implemented, and IIoT devices often are vulnerable to malicious users attempting to hack the device. The goal of this research is to create a lightweight software system that protects the endpoint devices from hackers, as well as prevent malicious accesses from impacting other parts of the system. This thesis will focus on the command and control unit, where the aim is to develop a neural net classifier to detect anomalies in network traffic. This thesis details the background surrounding IIoT endpoint devices, and the current attempts that have been made at providing a solution, as well as our approach to solving this problem, using both supervised and unsupervised machine learning approaches, and describe the testing environment with which the experiments were conducted. In the end we discuss how the work contributes to the future progress of IIoT security.
Description
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018
 
Cataloged from PDF version of thesis.
 
Includes bibliographical references (pages 67-68).
 
Date issued
2018
URI
https://hdl.handle.net/1721.1/121597
Department
Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
Publisher
Massachusetts Institute of Technology
Keywords
Electrical Engineering and Computer Science.

Collections
  • Graduate Theses

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

Login

Statistics

OA StatisticsStatistics by CountryStatistics by Department
MIT Libraries
PrivacyPermissionsAccessibilityContact us
MIT
Content created by the MIT Libraries, CC BY-NC unless otherwise noted. Notify us about copyright concerns.