dc.contributor.advisor | Michael Siegel. | en_US |
dc.contributor.author | Chu, Weilian. | en_US |
dc.contributor.other | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. | en_US |
dc.date.accessioned | 2019-07-12T17:40:38Z | |
dc.date.available | 2019-07-12T17:40:38Z | |
dc.date.copyright | 2018 | en_US |
dc.date.issued | 2018 | en_US |
dc.identifier.uri | https://hdl.handle.net/1721.1/121597 | |
dc.description | Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018 | en_US |
dc.description | Cataloged from PDF version of thesis. | en_US |
dc.description | Includes bibliographical references (pages 67-68). | en_US |
dc.description.abstract | The Internet of Things (IoT) is starting to take off in the modern day tech scene, with almost every user device being connected to a huge network with other devices; industrial energy delivery systems are no different. However, IoT in industry (known as IIoT) severely lags behind conventional IoT networks when it comes to cybersecurity, as IIoT endpoint devices generally lack the same level of memory and computation as conventional IoT endpoints. As a result, the same level of security measurements can't be implemented, and IIoT devices often are vulnerable to malicious users attempting to hack the device. The goal of this research is to create a lightweight software system that protects the endpoint devices from hackers, as well as prevent malicious accesses from impacting other parts of the system. This thesis will focus on the command and control unit, where the aim is to develop a neural net classifier to detect anomalies in network traffic. This thesis details the background surrounding IIoT endpoint devices, and the current attempts that have been made at providing a solution, as well as our approach to solving this problem, using both supervised and unsupervised machine learning approaches, and describe the testing environment with which the experiments were conducted. In the end we discuss how the work contributes to the future progress of IIoT security. | en_US |
dc.description.statementofresponsibility | by Weilian Chu. | en_US |
dc.format.extent | 68 pages | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Massachusetts Institute of Technology | en_US |
dc.rights | MIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission. | en_US |
dc.rights.uri | http://dspace.mit.edu/handle/1721.1/7582 | en_US |
dc.subject | Electrical Engineering and Computer Science. | en_US |
dc.title | Evaluating effectiveness of an embedded system endpoint security technology on energy delivery systems | en_US |
dc.type | Thesis | en_US |
dc.description.degree | M. Eng. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.identifier.oclc | 1098171923 | en_US |
dc.description.collection | M.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science | en_US |
dspace.imported | 2019-07-12T17:40:36Z | en_US |
mit.thesis.degree | Master | en_US |
mit.thesis.department | EECS | en_US |