Liu et al., 2018 - Google Patents
A novel intrusion detection algorithm for industrial control systems based on CNN and process state transitionLiu et al., 2018
- Document ID
- 8787622756173024753
- Author
- Liu J
- Yin L
- Hu Y
- Lv S
- Sun L
- Publication year
- Publication venue
- 2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)
External Links
Snippet
Abstract As closed Industrial Control Systems (ICS) gradually evolve toward networking, ICS data and operational processes can be easily tampered with by attackers, causing industrial control equipment to fail or become damaged. Depending on the characteristics of ICS …
- 238000001514 detection method 0 title abstract description 75
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | A novel intrusion detection algorithm for industrial control systems based on CNN and process state transition | |
Gou et al. | Aeroengine control system sensor fault diagnosis based on CWT and CNN | |
Wang et al. | Detection of power grid disturbances and cyber-attacks based on machine learning | |
Kiss et al. | Data clustering-based anomaly detection in industrial control systems | |
CN113312447B (en) | Semi-supervised log anomaly detection method based on probability label estimation | |
CN111901340B (en) | A kind of intrusion detection system and method for energy internet | |
CN103077347B (en) | A Composite Intrusion Detection Method Based on Data Fusion of Improved Kernel Vector Machine | |
Al-Hawawreh et al. | An efficient intrusion detection model for edge system in brownfield industrial internet of things | |
CN104809069A (en) | Source node loophole detection method based on integrated neural network | |
CN104598813A (en) | Computer intrusion detection method based on integrated study and semi-supervised SVM | |
CN107391598A (en) | One kind threatens information automatic generation method and system | |
CN107229849A (en) | Towards the database user behavior safety auditing method on power information intranet and extranet border | |
Wang et al. | Hydraulic system fault diagnosis method based on a multi‐feature fusion support vector machine | |
CN113067798B (en) | ICS intrusion detection method and device, electronic equipment and storage medium | |
Potluri et al. | Deep learning based efficient anomaly detection for securing process control systems against injection attacks | |
CN116451022A (en) | Adaptive bearing fault diagnosis method based on depth discrimination reactance domain | |
Yu et al. | Early fault diagnosis model design of reciprocating compressor valve based on multiclass support vector machine and decision tree | |
CN115146718B (en) | Wind turbine anomaly detection method based on deep representation | |
Chen et al. | Fault Detection for Turbine Engine Disk Based on Adaptive Weighted One‐Class Support Vector Machine | |
Luktarhan et al. | Multi-stage attack detection algorithm based on hidden markov model | |
Qu et al. | Instruction detection in SCADA/modbus network based on machine learning | |
Duan et al. | An intrusion detection model based on fuzzy C-means algorithm | |
Li et al. | Intrusion detection using temporal convolutional networks | |
CN105116323A (en) | Motor fault detection method based on RBF | |
Li | Fault diagnosis of motor rolling bearing based on GWO-SVM |