4.6 Article

Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System

Related references

Note: Only part of the references are listed.
Article Chemistry, Analytical

The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems

Asaad Balla et al.

Summary: Integrating IoT devices in SCADA systems has improved data collection and transmission technologies, but also presents security challenges. Many studies on IDS in SCADA systems neglect the fundamental issue of imbalanced datasets. This research investigates the impact of data imbalance on the effectiveness of a SCADA-based IDS.

SENSORS (2023)

Article

An enhanced intrusion detection method for AIM of smart grid

Huiqi Zhao et al.

Journal of Ambient Intelligence and Humanized Computing (2023)

Article Computer Science, Information Systems

Unknown Attack Traffic Classification in SCADA Network Using Heuristic Clustering Technique

Chuan Sheng et al.

IEEE Transactions on Network and Service Management (2023)

Article Mathematics

Cyber Security for Detecting Distributed Denial of Service Attacks in Agriculture 4.0: Deep Learning Model

Theyazn H. H. Aldhyani et al.

Summary: In order to secure IoT networks, deep learning models such as LSTM and CNN-LSTM have been used to construct network intrusion detection systems (NIDSs) for Agriculture 4.0 networks. The proposed model achieved a high level of precision (100%) in detecting various types of DDoS attacks, according to evaluation metrics like precision, recall, F1-score, and accuracy. This model provides a high level of protection against cyber threats in Agriculture 4.0.

MATHEMATICS (2023)

Article Computer Science, Information Systems

An industrial virus propagation model based on SCADA system

Qingyi Zhu et al.

INFORMATION SCIENCES (2023)

Article Computer Science, Information Systems

SCADA intrusion detection scheme exploiting the fusion of modified decision tree and Chi-square feature selection

Love Allen Chijioke Ahakonye et al.

Summary: The industrial internet of things (IIoT) and supervisory control and data acquisition (SCADA) have seen widespread growth, leading to an increase in unusual attacks. Existing intrusion detection systems (IDS) are computationally expensive and require additional research in effective feature extraction schemes. This study proposes an IDS with a fused feature selection approach for real-time SCADA network, demonstrating its reliability in precisely detecting abnormalities while minimizing computational time. The proposed model performs optimally compared to other techniques and shows resilience in imbalanced datasets.

INTERNET OF THINGS (2023)

Article Chemistry, Analytical

Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity

Theyazn H. H. Aldhyani et al.

Summary: Rapid technological development has significantly changed the automotive industry, particularly in the transition of vehicles from machine-controlled to software-controlled technologies. However, the complexity of data and traffic behaviors still poses cybersecurity issues and weaknesses in the autonomous vehicle network. Developing a system capable of rapidly detecting message attacks in the controller area network (CAN) is a major challenge. This study presents a high-performance system that utilizes artificial intelligence and deep learning approaches to protect the vehicle network from cyber threats.

SENSORS (2022)

Article Chemistry, Analytical

Advanced Feature Extraction and Selection Approach Using Deep Learning and Aquila Optimizer for IoT Intrusion Detection System

Abdulaziz Fatani et al.

Summary: In this study, a new intrusion detection system was developed utilizing swarm intelligence algorithms for feature extraction and selection. The system employed neural networks and the Aquila optimizer for this purpose. Performance evaluation on four public datasets demonstrated the competitive nature of the developed approach.

SENSORS (2022)

Article Chemistry, Analytical

Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices

Hasan Alkahtani et al.

Summary: With the rapid expansion of smartphone usage, malicious attacks against Android mobile devices are increasing. This study successfully detected malware in Android applications using machine learning and deep learning approaches, and demonstrated their efficiency compared to existing security systems.

SENSORS (2022)

Article Chemistry, Multidisciplinary

IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method

Khalid Albulayhi et al.

Summary: This paper proposes a novel feature selection and extraction approach for IoT intrusion detection systems. The approach utilizes entropy-based methods and mathematical set theory to extract the best features, and achieves a very high classification accuracy in testing.

APPLIED SCIENCES-BASEL (2022)

Article Computer Science, Information Systems

Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems

Hasan Alkahtani et al.

Summary: This research proposes an anomaly detection method for detecting cyberattacks in industrial control systems (ICSs) using artificial intelligence algorithms. The methodology incorporates various machine learning algorithms and deep learning networks, and was tested on real ICS datasets. The results demonstrate that the KNN and DT algorithms outperformed existing systems with high accuracy in binary classification and multiclass classification.

ELECTRONICS (2022)

Article Computer Science, Information Systems

Performance Investigation of Principal Component Analysis for Intrusion Detection System Using Different Support Vector Machine Kernels

Mohammed Amin Almaiah et al.

Summary: This paper presents a research model for an intrusion detection system based on Principal Component Analysis feature selection technique and different Support Vector Machine kernel classifiers. The impact of various kernel functions in SVM is investigated, and the performance of the investigation model is evaluated using multiple metrics. The results show that the Gaussian radial basis function kernel outperforms other kernels in terms of accuracy, sensitivity, and F-measure on both datasets.

ELECTRONICS (2022)

Article Computer Science, Information Systems

Artificial Intelligence Algorithms for Detecting and Classifying MQTT Protocol Internet of Things Attacks

Ali Alzahrani et al.

Summary: The Internet of Things (IoT) has become increasingly popular, promoting communication between smart devices to enhance process efficiency. The study proposes an intrusion detection system based on artificial intelligence algorithms, utilizing K-nearest neighbors (KNN), linear discriminant analysis (LDA), convolutional neural network (CNN), and convolutional long short-term memory neural network (CNN-LSTM) to identify MQTT protocol IoT intrusions. The deep learning algorithm achieved high precision in detecting intrusions, outperforming traditional machine learning methods like KNN and LDA.

ELECTRONICS (2022)

Article Chemistry, Analytical

Deep Learning-Based Industry 4.0 and Internet of Things towards Effective Energy Management for Smart Buildings

Mahmoud Elsisi et al.

Summary: The IoT technology enables intelligent decision-making and signal control between different machines, using deep learning methods to reduce energy consumption of air conditioners. The people detection system and YOLOv3 algorithm help optimize the management of air conditioning operations in smart buildings.

SENSORS (2021)

Article Chemistry, Analytical

SELAMAT: A New Secure and Lightweight Multi-Factor Authentication Scheme for Cross-Platform Industrial IoT Systems

Haqi Khalid et al.

Summary: The development of the industrial Internet of Things (IIoT) promotes the integration of cross-platform systems in fog computing. A new secure and lightweight multi-factor authentication scheme SELAMAT is proposed, which extends the Kerberos workflow and utilizes the AES-ECC algorithm for secure communication, and was tested for security analysis using AVISPA tool.

SENSORS (2021)

Article Automation & Control Systems

An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles

Maanak Gupta et al.

Summary: The vision of smart cities includes connected industrial vehicles providing intelligent services to users. The main goal of intelligent transportation systems is to ensure driver safety and user comfort. However, security and privacy concerns present significant barriers to the widespread adoption of this revolutionary technology.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

Intrusion Detection in Industrial Internet of Things Network-Based on Deep Learning Model with Rule-Based Feature Selection

Joseph Bamidele Awotunde et al.

Summary: The Industrial Internet of Things (IIoT) research area connects digital equipment and services to physical systems and faces challenges from various cyberattacks. A deep learning-based intrusion detection system with hybrid feature selection and neural network model is proposed to protect IIoT systems.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2021)

Review Green & Sustainable Science & Technology

A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification

Oyeniyi Akeem Alimi et al.

Summary: SCADA systems are crucial for remote access, monitoring, and control of critical infrastructures globally, but are exposed to security challenges. Effective detection and classification of SCADA system intrusions are pivotal for ensuring operational stability of national infrastructures.

SUSTAINABILITY (2021)

Article Engineering, Multidisciplinary

Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model With Majority Vote Ensemble Algorithm

Darshana Upadhyay et al.

Summary: An integrated framework for intrusion detection system for SCADA-based power grids is proposed, combining feature selection with a majority vote ensemble method. The approach selects features recursively based on Weighted Feature Importance scores and predicts output label using a total of nine heterogeneous classifiers, leading to improved accuracy and performance metrics.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Article Computer Science, Information Systems

Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future

Smriti Bhatt et al.

Summary: The Internet of Things (IoT) is improving human lives, but weak authentication and access control mechanisms could lead to unauthorized access and harm. To enhance security in the IoT ecosystem, a flexible and dynamic access control model is necessary to protect smart devices, data, and resources.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

A hybrid deep learning model for efficient intrusion detection in big data environment

Mohammad Mehedi Hassan et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

Anomaly Detection for Industrial Control System Based on Autoencoder Neural Network

Chao Wang et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2020)

Article Computer Science, Information Systems

Unsupervised Anomaly Detection for Network Data Streams in Industrial Control Systems

Limengwei Liu et al.

INFORMATION (2020)

Article Engineering, Civil

Real-Time Identification of Cyber-Physical Attacks on Water Distribution Systems via Machine Learning-Based Anomaly Detection Techniques

Ahmed A. Abokifa et al.

JOURNAL OF WATER RESOURCES PLANNING AND MANAGEMENT (2019)

Proceedings Paper Computer Science, Information Systems

Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning

Zecheng He et al.

2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019) (2019)

Article Computer Science, Information Systems

A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems

Nour Moustafa et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units

Congyuan Xu et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach

Marcio Andrey Teixeira et al.

FUTURE INTERNET (2018)

Proceedings Paper Computer Science, Software Engineering

Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks

Moshe Kravchik et al.

CPS-SPC'18: PROCEEDINGS OF THE 2018 WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY AND PRIVACY (2018)

Proceedings Paper Computer Science, Software Engineering

High-Performance Unsupervised Anomaly Detection for Cyber-Physical System Networks

Peter Schneider et al.

CPS-SPC'18: PROCEEDINGS OF THE 2018 WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY AND PRIVACY (2018)

Article Computer Science, Information Systems

A feature selection model based on genetic rank aggregation for text sentiment classification

Aytug Onan et al.

JOURNAL OF INFORMATION SCIENCE (2017)

Proceedings Paper Computer Science, Information Systems

Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning

Jun Inoue et al.

2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017) (2017)

Review Computer Science, Information Systems

A review of cyber security risk assessment methods for SCADA systems

Yulia Cherdantseva et al.

COMPUTERS & SECURITY (2016)

Proceedings Paper Computer Science, Information Systems

An HMM-Based Anomaly Detection Approach for SCADA Systems

Kyriakos Stefanidis et al.

INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2016 (2016)

Proceedings Paper Engineering, Electrical & Electronic

SWat: A Water Treatment Testbed for Research and Training on ICS Security

Aditya P. Mathur et al.

2016 INTERNATIONAL WORKSHOP ON CYBER-PHYSICAL SYSTEMS FOR SMART WATER NETWORKS (CYSWATER) (2016)

Article Computer Science, Information Systems

An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems

Abdulmohsen Almalawi et al.

COMPUTERS & SECURITY (2014)