Nothing Special   »   [go: up one dir, main page]

Safari et al., 2021 - Google Patents

Industrial intrusion detection based on the behavior of rotating machine

Safari et al., 2021

Document ID
3990517294624304266
Author
Safari M
Parvinnia E
Haddad A
Publication year
Publication venue
International Journal of Critical Infrastructure Protection

External Links

Snippet

In this study, a new industrial intrusion detection method is introduced for the control system of rotating machines as critical assets in many industries. Data tampering is a major attack on the control systems which disrupts the functionality of the asset. Hence, our objective is to …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • G06N5/025Extracting rules from data

Similar Documents

Publication Publication Date Title
Feng et al. Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks
Ayodeji et al. A new perspective towards the development of robust data-driven intrusion detection for industrial control systems
US20190089722A1 (en) Intrusion detection via semantic fuzzing and message provenance
Chen et al. A cyber‐secure control‐detector architecture for nonlinear processes
AU2020102142A4 (en) Technique for multilayer protection from quantifiable vulnerabilities in industrial cyber physical system
Abutu et al. Deepcodelock: A novel deep learning-based approach for automated ransomware detection using behavioral signatures
Anthi et al. A three-tiered intrusion detection system for industrial control systems
Safari et al. Industrial intrusion detection based on the behavior of rotating machine
Choubineh et al. Applying separately cost-sensitive learning and Fisher's discriminant analysis to address the class imbalance problem: A case study involving a virtual gas pipeline SCADA system
Teng et al. Deep learning-based risk management of financial market in smart grid
Lopez Perez et al. Forget the Myth of the Air Gap: Machine Learningfor Reliable Intrusion Detection in SCADA Systems
Al-Hawawreh et al. Explainable deep learning for attack intelligence and combating cyber–physical attacks
Mujeeb Ahmed et al. Machine learning for cps security: applications, challenges and recommendations
Teixeira et al. Flow‐based intrusion detection algorithm for supervisory control and data acquisition systems: A real‐time approach
Maurya et al. Epasad: ellipsoid decision boundary based process-aware stealthy attack detector
Alqurashi et al. On the performance of isolation forest and multi layer perceptron for anomaly detection in industrial control systems networks
Ali et al. Survey on cyber security for industrial control systems
Chen et al. Code integrity attestation for PLCs using black box neural network predictions
Santhi et al. A duo autoencoder-SVM based approach for secure performance monitoring of industrial conveyor belt system
Russell et al. On the fence: Anomaly detection in IoT networks
Oyinloye et al. Enhancing cyber threat detection with an improved artificial neural network model
Diaba The Role of Machine Learning Algorithms in Smart Grid Cybersecurity
Perales Gómez et al. An interpretable semi‐supervised system for detecting cyberattacks using anomaly detection in industrial scenarios
Cui et al. An Improved Support Vector Machine Attack Detection Algorithm for Industry Controls System
Fiah Anomaly detection in SCADA systems using machine learning