4.5 Article

ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks

Related references

Note: Only part of the references are listed.
Article Chemistry, Analytical

An Imbalanced Generative Adversarial Network-Based Approach for Network Intrusion Detection in an Imbalanced Dataset

Yamarthi Narasimha Rao et al.

Summary: In modern networks, a Network Intrusion Detection System (NIDS) is important for detecting unauthorized activity. The imbalanced class issues limit the effectiveness of categorization for minority classes. We propose an Imbalanced Generative Adversarial Network (IGAN) to address this problem and achieve better accuracy and performance compared to other deep learning approaches.

SENSORS (2023)

Article Computer Science, Information Systems

CPS Attack Detection under Limited Local Information in Cyber Security: An Ensemble Multi-node Multi-class Classification Approach

Junyi Liu et al.

ACM Transactions on Sensor Networks (2023)

Article Engineering, Multidisciplinary

Deep learning-based intrusion detection approach for securing industrial Internet of Things

Sahar Soliman et al.

Summary: The widespread deployment of the Industrial Internet of Things (IIoT) has raised the challenge of security and privacy. This paper proposes an intelligent detection system that effectively identifies and mitigates cyberattacks in IIoT networks using techniques such as singular value decomposition (SVD) and synthetic minority oversampling (SMOTE).

ALEXANDRIA ENGINEERING JOURNAL (2023)

Article Computer Science, Artificial Intelligence

A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks

Izhar Ahmed Khan et al.

Summary: A privacy-conserving framework called PC-IDS is proposed for achieving the privacy and safety features of Smart Power Systems through a hybrid machine learning approach. The framework includes two key components: data pre-processing for privacy preservation and intrusion detection using a probabilistic neural network. Experimental results demonstrate that the framework can effectively protect data and identify malicious events.

APPLIED INTELLIGENCE (2021)

Article Computer Science, Information Systems

Cybersecurity for industrial control systems: A survey

Deval Bhamare et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Artificial Intelligence

Deep Least Squares Fisher Discriminant Analysis

David Diaz-Vico et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2020)

Article Computer Science, Artificial Intelligence

A new hybrid approach for intrusion detection using machine learning methods

Unal Cavusoglu

APPLIED INTELLIGENCE (2019)

Article Computer Science, Information Systems

A Deep Learning Method With Filter Based Feature Engineering for Wireless Intrusion Detection System

Sydney Mambwe Kasongo et al.

IEEE ACCESS (2019)

Article Mathematical & Computational Biology

Machine-Learning Approach to Optimize SMOTE Ratio in Class Imbalance Dataset for Intrusion Detection

Jae-Hyun Seo et al.

COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE (2018)

Proceedings Paper Computer Science, Hardware & Architecture

Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM networks

Cheng Feng et al.

2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN) (2017)

Article Multidisciplinary Sciences

A Novel Algorithm for Imbalance Data Classification Based on Genetic Algorithm Improved SMOTE

Kun Jiang et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2016)

Proceedings Paper Computer Science, Hardware & Architecture

An Investigation into the Response of a Water Treatment System to Cyber Attacks

Sridhar Adepu et al.

2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE) (2016)

Article Computer Science, Information Systems

Combating advanced persistent threats: From network event correlation to incident detection

Ivo Friedberg et al.

COMPUTERS & SECURITY (2015)

Proceedings Paper Computer Science, Artificial Intelligence

Intrusion Detection Alarm Filtering Technology Based on Ant Colony Clustering Algorithm

Xu Yang et al.

PROCEEDINGS 2015 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS ISDEA 2015 (2015)

Proceedings Paper Computer Science, Artificial Intelligence

Potentials of Using One-class SVM for Detecting Protocol-specific Anomalies in Industrial Networks

Franka Schuster et al.

2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI) (2015)

Article Automation & Control Systems

lp-norms in One-Class Classification for Intrusion Detection in SCADA Systems

Patric Nader et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)

Article Engineering, Electrical & Electronic

Smart grid forensic science: applications, challenges, and open issues

M. Erol-Kantarci et al.

IEEE COMMUNICATIONS MAGAZINE (2013)

Proceedings Paper Computer Science, Artificial Intelligence

An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications

Justin M. Beaver et al.

2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2 (2013)

Article Computer Science, Hardware & Architecture

A cyber-physical experimentation environment for the security analysis of networked industrial control systems

Bela Genge et al.

COMPUTERS & ELECTRICAL ENGINEERING (2012)

Editorial Material Computer Science, Information Systems

Stuxnet: Dissecting a Cyberwarfare Weapon

Ralph Langner

IEEE SECURITY & PRIVACY (2011)

Proceedings Paper Computer Science, Information Systems

Modbus/DNP3 State-based Intrusion Detection System

Igor Nai Fovino et al.

2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) (2010)

Article Computer Science, Artificial Intelligence

A multiple resampling method for learning from imbalanced data sets

A Estabrooks et al.

COMPUTATIONAL INTELLIGENCE (2004)

Article Computer Science, Artificial Intelligence

Random forests

L Breiman

MACHINE LEARNING (2001)