Safari et al., 2021 - Google Patents
Industrial intrusion detection based on the behavior of rotating machineSafari et al., 2021
- Document ID
- 3990517294624304266
- Author
- Safari M
- Parvinnia E
- Haddad A
- Publication year
- Publication venue
- International Journal of Critical Infrastructure Protection
External Links
Snippet
In this study, a new industrial intrusion detection method is introduced for the control system of rotating machines as critical assets in many industries. Data tampering is a major attack on the control systems which disrupts the functionality of the asset. Hence, our objective is to …
- 238000001514 detection method 0 title abstract description 145
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Feng et al. | Multi-level anomaly detection in industrial control systems via package signatures and LSTM networks | |
Ayodeji et al. | A new perspective towards the development of robust data-driven intrusion detection for industrial control systems | |
US20190089722A1 (en) | Intrusion detection via semantic fuzzing and message provenance | |
Chen et al. | A cyber‐secure control‐detector architecture for nonlinear processes | |
AU2020102142A4 (en) | Technique for multilayer protection from quantifiable vulnerabilities in industrial cyber physical system | |
Abutu et al. | Deepcodelock: A novel deep learning-based approach for automated ransomware detection using behavioral signatures | |
Anthi et al. | A three-tiered intrusion detection system for industrial control systems | |
Safari et al. | Industrial intrusion detection based on the behavior of rotating machine | |
Choubineh et al. | Applying separately cost-sensitive learning and Fisher's discriminant analysis to address the class imbalance problem: A case study involving a virtual gas pipeline SCADA system | |
Teng et al. | Deep learning-based risk management of financial market in smart grid | |
Lopez Perez et al. | Forget the Myth of the Air Gap: Machine Learningfor Reliable Intrusion Detection in SCADA Systems | |
Al-Hawawreh et al. | Explainable deep learning for attack intelligence and combating cyber–physical attacks | |
Mujeeb Ahmed et al. | Machine learning for cps security: applications, challenges and recommendations | |
Teixeira et al. | Flow‐based intrusion detection algorithm for supervisory control and data acquisition systems: A real‐time approach | |
Maurya et al. | Epasad: ellipsoid decision boundary based process-aware stealthy attack detector | |
Alqurashi et al. | On the performance of isolation forest and multi layer perceptron for anomaly detection in industrial control systems networks | |
Ali et al. | Survey on cyber security for industrial control systems | |
Chen et al. | Code integrity attestation for PLCs using black box neural network predictions | |
Santhi et al. | A duo autoencoder-SVM based approach for secure performance monitoring of industrial conveyor belt system | |
Russell et al. | On the fence: Anomaly detection in IoT networks | |
Oyinloye et al. | Enhancing cyber threat detection with an improved artificial neural network model | |
Diaba | The Role of Machine Learning Algorithms in Smart Grid Cybersecurity | |
Perales Gómez et al. | An interpretable semi‐supervised system for detecting cyberattacks using anomaly detection in industrial scenarios | |
Cui et al. | An Improved Support Vector Machine Attack Detection Algorithm for Industry Controls System | |
Fiah | Anomaly detection in SCADA systems using machine learning |