Nothing Special   »   [go: up one dir, main page]

Arifin et al., 2024 - Google Patents

Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104

Arifin et al., 2024

View PDF @Full View
Document ID
11707469928475735951
Author
Arifin M
Stiawan D
Yudho Suprapto B
Susanto S
Salim T
Idris M
Budiarto R
Publication year
Publication venue
IET Cyber‐Physical Systems: Theory & Applications

External Links

Snippet

Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are vulnerable to various attacks, and therefore, intelligent and robust intrusion detection systems as security tools are …
Continue reading at ietresearch.onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Presekal et al. Attack graph model for cyber-physical power systems using hybrid deep learning
Tufan et al. Anomaly-based intrusion detection by machine learning: A case study on probing attacks to an institutional network
Muthamil Sudar et al. A two level security mechanism to detect a DDoS flooding attack in software-defined networks using entropy-based and C4. 5 technique
Chu et al. Penetration testing for internet of things and its automation
Sudharsan et al. Edge2guard: Botnet attacks detecting offline models for resource-constrained iot devices
Kelli et al. Attacking and defending DNP3 ICS/SCADA systems
Mubarak et al. Industrial datasets with ICS testbed and attack detection using machine learning techniques
Ma et al. DDoS detection for 6G Internet of Things: Spatial-temporal trust model and new architecture
Obeidat et al. Smart approach for botnet detection based on Network Traffic analysis
Lee et al. AI-based network security enhancement for 5G industrial Internet of things environments
Zolotukhin et al. Data mining approach for detection of DDoS attacks utilizing SSL/TLS protocol
Radoglou-Grammatikis et al. Trusty: A solution for threat hunting using data analysis in critical infrastructures
Khan et al. Lightweight testbed for cybersecurity experiments in scada-based systems
Arifin et al. Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104
Li et al. The optimized attribute attack graph based on APT attack stage model
Ghasabi et al. Using optimized statistical distances to confront distributed denial of service attacks in software defined networks
Zhu et al. MCFM: Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System
CN112491801B (en) Incidence matrix-based object-oriented network attack modeling method and device
Lysenko et al. Technique for Cyberattacks Detection Based on DNS Traffic Analysis.
Heenan et al. A survey of Intrusion Detection System technologies
Nicheporuk et al. A System for Detecting Anomalies and Identifying Smart Home Devices Using Collective Communication.
Dayanandam et al. Regression algorithms for efficient detection and prediction of DDoS attacks
Ariffin et al. IoT attacks and mitigation plan: A preliminary study with Machine Learning Algorithms
Huang et al. Machine tools fingerprinting for distributed numerical control systems
Muhammad et al. An IDS for DDoS Attacks in SDN using VGG-Based CNN Architecture