Abid et al., 2022 - Google Patents
Distributed architecture of an intrusion detection system in industrial control systemsAbid et al., 2022
- Document ID
- 10891828279090115857
- Author
- Abid A
- Jemili F
- Korbaa O
- Publication year
- Publication venue
- International Conference on Computational Collective Intelligence
External Links
Snippet
Industry 4.0 refers to a new generation of connected and intelligent factories that is driven by the emergence of new technologies such as artificial intelligence, Cloud computing, Big Data and industrial control systems (ICS) in order to automate all phases of industrial …
- 238000001514 detection method 0 title abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lin et al. | Retrieval of relevant historical data triage operations in security operation centers | |
Feng et al. | Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks | |
Breier et al. | A dynamic rule creation based anomaly detection method for identifying security breaches in log records | |
CN112639781A (en) | Knowledge graph for real-time industrial control system security event monitoring and management | |
Abid et al. | Distributed architecture of an intrusion detection system in industrial control systems | |
Jahromi et al. | An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things | |
Sharon et al. | An intelligent intrusion detection system using hybrid deep learning approaches in cloud environment | |
Umer et al. | Integrating design and data centric approaches to generate invariants for distributed attack detection | |
Perez et al. | Forget the myth of the air gap: Machine learning for reliable intrusion detection in SCADA systems | |
Lambert II | Security analytics: Using deep learning to detect cyber attacks | |
Singh et al. | Cyber threat analysis and prediction using machine learning | |
Jose et al. | Anomaly detection on system generated logs—a survey study | |
Guimaraes et al. | A threat monitoring system for intelligent data analytics of network traffic | |
Zhang et al. | A novel approach for traffic anomaly detection in power distributed control system and substation system | |
Seng et al. | Why anomaly-based intrusion detection systems have not yet conquered the industrial market? | |
Efiong et al. | CyberSCADA Network Security Analysis Model for Intrusion Detection Systems in the Smart Grid | |
Qu et al. | Instruction detection in scada/modbus network based on machine learning | |
Eke et al. | Detection of false command and response injection attacks for cyber physical systems security and resilience | |
Bhattacharya et al. | Anomalies Detection on Contemporary Industrial Internet of Things Data for Securing Crucial Devices | |
Potluri et al. | Securing industrial control systems from false data injection attacks with convolutional neural networks | |
Arnold et al. | Machine Learning Models for Cyberattack Detection in Industrial Control Systems | |
Vinutha et al. | Analysis of NSL-KDD dataset using K-means and canopy clustering algorithms based on distance metrics | |
Dey et al. | Heterogeneous security events prioritization using auto-encoders | |
Kryukov et al. | Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation | |
Behera et al. | Anomaly detection of unstructured logs generated from complex micro-service based architecture using one-class SVM |