[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Abid et al., 2022 - Google Patents

Distributed architecture of an intrusion detection system in industrial control systems

Abid et al., 2022

Document ID
10891828279090115857
Author
Abid A
Jemili F
Korbaa O
Publication year
Publication venue
International Conference on Computational Collective Intelligence

External Links

Snippet

Industry 4.0 refers to a new generation of connected and intelligent factories that is driven by the emergence of new technologies such as artificial intelligence, Cloud computing, Big Data and industrial control systems (ICS) in order to automate all phases of industrial …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks

Similar Documents

Publication Publication Date Title
Lin et al. Retrieval of relevant historical data triage operations in security operation centers
Feng et al. Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks
Breier et al. A dynamic rule creation based anomaly detection method for identifying security breaches in log records
CN112639781A (en) Knowledge graph for real-time industrial control system security event monitoring and management
Abid et al. Distributed architecture of an intrusion detection system in industrial control systems
Jahromi et al. An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things
Sharon et al. An intelligent intrusion detection system using hybrid deep learning approaches in cloud environment
Umer et al. Integrating design and data centric approaches to generate invariants for distributed attack detection
Perez et al. Forget the myth of the air gap: Machine learning for reliable intrusion detection in SCADA systems
Lambert II Security analytics: Using deep learning to detect cyber attacks
Singh et al. Cyber threat analysis and prediction using machine learning
Jose et al. Anomaly detection on system generated logs—a survey study
Guimaraes et al. A threat monitoring system for intelligent data analytics of network traffic
Zhang et al. A novel approach for traffic anomaly detection in power distributed control system and substation system
Seng et al. Why anomaly-based intrusion detection systems have not yet conquered the industrial market?
Efiong et al. CyberSCADA Network Security Analysis Model for Intrusion Detection Systems in the Smart Grid
Qu et al. Instruction detection in scada/modbus network based on machine learning
Eke et al. Detection of false command and response injection attacks for cyber physical systems security and resilience
Bhattacharya et al. Anomalies Detection on Contemporary Industrial Internet of Things Data for Securing Crucial Devices
Potluri et al. Securing industrial control systems from false data injection attacks with convolutional neural networks
Arnold et al. Machine Learning Models for Cyberattack Detection in Industrial Control Systems
Vinutha et al. Analysis of NSL-KDD dataset using K-means and canopy clustering algorithms based on distance metrics
Dey et al. Heterogeneous security events prioritization using auto-encoders
Kryukov et al. Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation
Behera et al. Anomaly detection of unstructured logs generated from complex micro-service based architecture using one-class SVM