[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sivamohan et al., 2023 - Google Patents

An optimized model for network intrusion detection systems in industry 4.0 using XAI based Bi-LSTM framework

Sivamohan et al., 2023

View HTML
Document ID
11029120242958543585
Author
Sivamohan S
Sridhar S
Publication year
Publication venue
Neural Computing and Applications

External Links

Snippet

Industry 4.0 enable novel business cases, such as client-specific production, real-time monitoring of process condition and progress, independent decision making and remote maintenance, to name a few. However, they are more susceptible to a broad range of cyber …
Continue reading at link.springer.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00624Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
    • G06K9/00771Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Similar Documents

Publication Publication Date Title
Sivamohan et al. An optimized model for network intrusion detection systems in industry 4.0 using XAI based Bi-LSTM framework
Kozik et al. A scalable distributed machine learning approach for attack detection in edge computing environments
Rouzbahani et al. A snapshot ensemble deep neural network model for attack detection in industrial internet of things
Bebortta et al. An opportunistic ensemble learning framework for network traffic classification in iot environments
Nanjappan et al. DeepLG SecNet: Utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments
Mishra et al. Hybrid deep learning algorithm for smart cities security enhancement through blockchain and internet of things
Reddy et al. Catboosting approach for anomaly detection in iot-based smart home environment
Nandanwar et al. TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment
Prabhakaran et al. mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system
Wanjau et al. Network intrusion detection systems: A systematic literature review of hybrid deep learning approaches
Bhattacharya et al. Anomalies Detection on Contemporary Industrial Internet of Things Data for Securing Crucial Devices
Mathew Machine learning in cyber-security threats
Jan et al. Effective intrusion detection in IoT environment: deep learning approach
Farea et al. Advanced Optimized Anomaly Detection System for IoT Cyberattacks Using Artificial Intelligence.
Kumar et al. Attack detection scheme using deep learning approach for iot
Sengan et al. Improved LSTM-Based Anomaly Detection Model with Cybertwin Deep Learning to Detect Cutting-Edge Cybersecurity Attacks
Mutalib et al. Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: a review
Iqbal et al. Securing IoT Using Supervised Machine Learning
Li et al. An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data
Deshmukh et al. Detection and Prevention of Malicious Activities in Vulnerable Network Security Using Deep Learning
Sarker Learning Technologies: Toward Machine Learning and Deep Learning for Cybersecurity
Naz et al. A Comparison of Ensemble Learning for Intrusion Detection in Telemetry Data
Rais et al. Analysis of Intrusion Detection Using Ensemble Stacking-Based Machine Learning Techniques in IoT Networks
Sigamani Adoption of machine learning with adaptive approach for securing CPS
Aljohani et al. AI-Based Intrusion Detection for a Secure Internet of Things (IoT)