[HTML][HTML] A new perspective towards the development of robust data-driven intrusion detection for industrial control systems
A Ayodeji, Y Liu, N Chao, L Yang - Nuclear engineering and technology, 2020 - Elsevier
Most of the machine learning-based intrusion detection tools developed for Industrial
Control Systems (ICS) are trained on network packet captures, and they rely on monitoring …
Control Systems (ICS) are trained on network packet captures, and they rely on monitoring …
Network anomaly detection using deep learning techniques
MK Hooshmand, D Hosahalli - CAAI Transactions on …, 2022 - Wiley Online Library
Convolutional neural networks (CNNs) are the specific architecture of feed‐forward artificial
neural networks. It is the de‐facto standard for various operations in machine learning and …
neural networks. It is the de‐facto standard for various operations in machine learning and …
A multiple-layer representation learning model for network-based attack detection
X Zhang, J Chen, Y Zhou, L Han, J Lin - IEEE Access, 2019 - ieeexplore.ieee.org
Accurate detection of network-based attacks is crucial to prevent security breaches of
information systems. The recent application of deep learning approaches for network …
information systems. The recent application of deep learning approaches for network …
Convolutional neural networks for multi-class intrusion detection system
Advances in communication and networking technology leads to the use of internet-based
technology in Industrial Control System (ICS) applications. Simultaneously to the …
technology in Industrial Control System (ICS) applications. Simultaneously to the …
Detection and multi-class classification of intrusion in software defined networks using stacked auto-encoders and CICIDS2017 dataset
Abstract Software Defined Networks (SDNs) is an emerging concept in network
architectures, which divides the network operations into two, control and data, layers. In this …
architectures, which divides the network operations into two, control and data, layers. In this …
Analysis of anomaly detection approaches performed through deep learning methods in SCADA systems
Supervisory control and data acquisition (SCADA) systems are used with monitoring and
control purposes for the process not to fail in industrial control systems. Today, the increase …
control purposes for the process not to fail in industrial control systems. Today, the increase …
A systematic map** study and empirical comparison of data-driven intrusion detection techniques in industrial control networks
A rising communication between modern industrial control infrastructure and the external
Internet worldwide has led to a critical need to secure the network from multifarious …
Internet worldwide has led to a critical need to secure the network from multifarious …
Application of histogram-based outlier scores to detect computer network anomalies
N Paulauskas, A Baskys - Electronics, 2019 - mdpi.com
Misuse activity in computer networks constantly creates new challenges and difficulties to
ensure data confidentiality, integrity, and availability. The capability to identify and quickly …
ensure data confidentiality, integrity, and availability. The capability to identify and quickly …
[PDF][PDF] An efficient intrusion detection framework in software-defined networking for cybersecurity applications
Network management and multimedia data mining techniques have a great interest in
analyzing and improving the network traffic process. In recent times, the most complex task …
analyzing and improving the network traffic process. In recent times, the most complex task …
Evaluating the performance of various SVM kernel functions based on basic features extracted from KDDCUP'99 dataset by random forest method for detecting DDoS …
The main goal of Denial of Service (DoS) attack is to restrict authorized users from gaining
access to available services and resources or to prevent from processing the benign events …
access to available services and resources or to prevent from processing the benign events …