Arifin et al., 2024 - Google Patents
Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104Arifin et al., 2024
View PDF- Document ID
- 11707469928475735951
- Author
- Arifin M
- Stiawan D
- Yudho Suprapto B
- Susanto S
- Salim T
- Idris M
- Budiarto R
- Publication year
- Publication venue
- IET Cyber‐Physical Systems: Theory & Applications
External Links
Snippet
Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are vulnerable to various attacks, and therefore, intelligent and robust intrusion detection systems as security tools are …
- 238000001514 detection method 0 title abstract description 35
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Presekal et al. | Attack graph model for cyber-physical power systems using hybrid deep learning | |
Tufan et al. | Anomaly-based intrusion detection by machine learning: A case study on probing attacks to an institutional network | |
Muthamil Sudar et al. | A two level security mechanism to detect a DDoS flooding attack in software-defined networks using entropy-based and C4. 5 technique | |
Chu et al. | Penetration testing for internet of things and its automation | |
Sudharsan et al. | Edge2guard: Botnet attacks detecting offline models for resource-constrained iot devices | |
Kelli et al. | Attacking and defending DNP3 ICS/SCADA systems | |
Mubarak et al. | Industrial datasets with ICS testbed and attack detection using machine learning techniques | |
Ma et al. | DDoS detection for 6G Internet of Things: Spatial-temporal trust model and new architecture | |
Obeidat et al. | Smart approach for botnet detection based on Network Traffic analysis | |
Lee et al. | AI-based network security enhancement for 5G industrial Internet of things environments | |
Zolotukhin et al. | Data mining approach for detection of DDoS attacks utilizing SSL/TLS protocol | |
Radoglou-Grammatikis et al. | Trusty: A solution for threat hunting using data analysis in critical infrastructures | |
Khan et al. | Lightweight testbed for cybersecurity experiments in scada-based systems | |
Arifin et al. | Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104 | |
Li et al. | The optimized attribute attack graph based on APT attack stage model | |
Ghasabi et al. | Using optimized statistical distances to confront distributed denial of service attacks in software defined networks | |
Zhu et al. | MCFM: Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System | |
CN112491801B (en) | Incidence matrix-based object-oriented network attack modeling method and device | |
Lysenko et al. | Technique for Cyberattacks Detection Based on DNS Traffic Analysis. | |
Heenan et al. | A survey of Intrusion Detection System technologies | |
Nicheporuk et al. | A System for Detecting Anomalies and Identifying Smart Home Devices Using Collective Communication. | |
Dayanandam et al. | Regression algorithms for efficient detection and prediction of DDoS attacks | |
Ariffin et al. | IoT attacks and mitigation plan: A preliminary study with Machine Learning Algorithms | |
Huang et al. | Machine tools fingerprinting for distributed numerical control systems | |
Muhammad et al. | An IDS for DDoS Attacks in SDN using VGG-Based CNN Architecture |