HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems

作者: Izhar Ahmed Khan , Dechang Pi , Zaheer Ullah Khan , Yasir Hussain , Asif Nawaz

DOI: 10.1109/ACCESS.2019.2925838

关键词: Intrusion detection systemPreprocessorData miningIndustrial control systemBenchmark (computing)SCADACritical infrastructureBloom filterComputer scienceAnomaly detection

摘要: … years, and several intrusion detection systems have been … The challenge in constructing an intrusion detection … Third, we employed an edited nearest-neighbor rule algorithm to …

参考文章(28)
Luai Al Shalabi, Zyad Shaaban, Basel Kasasbeh, Data Mining: A Preprocessing Engine Journal of Computer Science. ,vol. 2, pp. 735- 739 ,(2006) , 10.3844/JCSSP.2006.735.739
Sridhar Adepu, Aditya Mathur, An Investigation into the Response of a Water Treatment System to Cyber Attacks 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE). pp. 141- 148 ,(2016) , 10.1109/HASE.2016.14
BooJoong Kang, Kieran McLaughlin, Sakir Sezer, Towards a stateful analysis framework for smart grid network intrusion detection ICS-CSR '16 Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016. pp. 1- 8 ,(2016) , 10.14236/EWIC/ICS2016.14
Syed Noorulhassan Shirazi, Antonios Gouglidis, Kanza Noor Syeda, Steven Simpson, Andreas Mauthe, Ioannis M. Stephanakis, David Hutchison, Evaluation of Anomaly Detection techniques for SCADA communication resilience 2016 Resilience Week (RWS). pp. 140- 145 ,(2016) , 10.1109/RWEEK.2016.7573322
Md. Zahangir Alom, VenkataRamesh Bontupalli, Tarek M. Taha, Intrusion detection using deep belief networks national aerospace and electronics conference. pp. 339- 344 ,(2015) , 10.1109/NAECON.2015.7443094
Khaled Alrawashdeh, Carla Purdy, Toward an Online Anomaly Intrusion Detection System Based on Deep Learning international conference on machine learning and applications. pp. 195- 200 ,(2016) , 10.1109/ICMLA.2016.0040
Mohammad Sabokrou, Mohsen Fayyaz, Mahmood Fathy, Reinhard Klette, Deep-Cascade: Cascading 3D Deep Neural Networks for Fast Anomaly Detection and Localization in Crowded Scenes IEEE Transactions on Image Processing. ,vol. 26, pp. 1992- 2004 ,(2017) , 10.1109/TIP.2017.2670780
Thomas Schlegl, Philipp Seeböck, Sebastian M. Waldstein, Ursula Schmidt-Erfurth, Georg Langs, Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery international conference information processing. pp. 146- 157 ,(2017) , 10.1007/978-3-319-59050-9_12
Shitharth S, Prince Winston D, An enhanced optimization based algorithm for intrusion detection in SCADA network Computers & Security. ,vol. 70, pp. 16- 26 ,(2017) , 10.1016/J.COSE.2017.04.012
Chuanlong Yin, Yuefei Zhu, Jinlong Fei, Xinzheng He, A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks IEEE Access. ,vol. 5, pp. 21954- 21961 ,(2017) , 10.1109/ACCESS.2017.2762418