[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Liu et al., 2018 - Google Patents

A novel intrusion detection algorithm for industrial control systems based on CNN and process state transition

Liu et al., 2018

Document ID
8787622756173024753
Author
Liu J
Yin L
Hu Y
Lv S
Sun L
Publication year
Publication venue
2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)

External Links

Snippet

Abstract As closed Industrial Control Systems (ICS) gradually evolve toward networking, ICS data and operational processes can be easily tampered with by attackers, causing industrial control equipment to fail or become damaged. Depending on the characteristics of ICS …
Continue reading at www.computer.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor

Similar Documents

Publication Publication Date Title
Liu et al. A novel intrusion detection algorithm for industrial control systems based on CNN and process state transition
Gou et al. Aeroengine control system sensor fault diagnosis based on CWT and CNN
Wang et al. Detection of power grid disturbances and cyber-attacks based on machine learning
Kiss et al. Data clustering-based anomaly detection in industrial control systems
CN113312447B (en) Semi-supervised log anomaly detection method based on probability label estimation
CN111901340B (en) A kind of intrusion detection system and method for energy internet
CN103077347B (en) A Composite Intrusion Detection Method Based on Data Fusion of Improved Kernel Vector Machine
Al-Hawawreh et al. An efficient intrusion detection model for edge system in brownfield industrial internet of things
CN104809069A (en) Source node loophole detection method based on integrated neural network
CN104598813A (en) Computer intrusion detection method based on integrated study and semi-supervised SVM
CN107391598A (en) One kind threatens information automatic generation method and system
CN107229849A (en) Towards the database user behavior safety auditing method on power information intranet and extranet border
Wang et al. Hydraulic system fault diagnosis method based on a multi‐feature fusion support vector machine
CN113067798B (en) ICS intrusion detection method and device, electronic equipment and storage medium
Potluri et al. Deep learning based efficient anomaly detection for securing process control systems against injection attacks
CN116451022A (en) Adaptive bearing fault diagnosis method based on depth discrimination reactance domain
Yu et al. Early fault diagnosis model design of reciprocating compressor valve based on multiclass support vector machine and decision tree
CN115146718B (en) Wind turbine anomaly detection method based on deep representation
Chen et al. Fault Detection for Turbine Engine Disk Based on Adaptive Weighted One‐Class Support Vector Machine
Luktarhan et al. Multi-stage attack detection algorithm based on hidden markov model
Qu et al. Instruction detection in SCADA/modbus network based on machine learning
Duan et al. An intrusion detection model based on fuzzy C-means algorithm
Li et al. Intrusion detection using temporal convolutional networks
CN105116323A (en) Motor fault detection method based on RBF
Li Fault diagnosis of motor rolling bearing based on GWO-SVM