메뉴 건너뛰기




Volumn , Issue , 2016, Pages 34-43

Behaviour-based attack detection and classification in cyber physical systems using machine learning

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPLEX NETWORKS; COMPUTER CRIME; CRIME; EMBEDDED SYSTEMS; INTRUSION DETECTION; LEARNING SYSTEMS; WATER TREATMENT;

EID: 84978795140     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2899015.2899016     Document Type: Conference Paper
Times cited : (99)

References (36)
  • 3
    • 84900856383 scopus 로고    scopus 로고
    • Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components
    • I. Ahmad, M. Hussain, A. Alghamdi, and A. Alelaiwi. Enhancing svm performance in intrusion detection using optimal feature subset selection based on genetic principal components. Neural Computing and Applications, 24(7-8):1671-1682, 2014.
    • (2014) Neural Computing and Applications , vol.24 , Issue.7-8 , pp. 1671-1682
    • Ahmad, I.1    Hussain, M.2    Alghamdi, A.3    Alelaiwi, A.4
  • 4
    • 84963694944 scopus 로고    scopus 로고
    • Network intrusion detection system using neural network classification of attack behavior
    • O. Al-Jarrah and A. Arafat. Network intrusion detection system using neural network classification of attack behavior. Journal of Advances in Information Technology Vol, 6(1), 2015.
    • (2015) Journal of Advances in Information Technology , vol.6 , Issue.1
    • Al-Jarrah, O.1    Arafat, A.2
  • 6
    • 0035478854 scopus 로고    scopus 로고
    • Random forests
    • L. Breiman. Random forests. Machine learning, 45(1):5-32, 2001.
    • (2001) Machine Learning , vol.45 , Issue.1 , pp. 5-32
    • Breiman, L.1
  • 13
    • 84963704036 scopus 로고    scopus 로고
    • On cyber attacks and signature based intrusion detection for modbus based industrial control systems
    • W. Gao and T. H. Morris. On cyber attacks and signature based intrusion detection for modbus based industrial control systems. Journal of Digital Forensics, Security and Law, 9(1):37-56, 2014.
    • (2014) Journal of Digital Forensics, Security and Law , vol.9 , Issue.1 , pp. 37-56
    • Gao, W.1    Morris, T.H.2
  • 16
    • 84865209539 scopus 로고    scopus 로고
    • A network intrusion detection system based on a hidden naïve bayes multiclass classifier
    • L. Koc, T. A. Mazzuchi, and S. Sarkani. A network intrusion detection system based on a hidden naïve bayes multiclass classifier. Expert Systems with Applications, 39(18):13492-13500, 2012.
    • (2012) Expert Systems with Applications , vol.39 , Issue.18 , pp. 13492-13500
    • Koc, L.1    Mazzuchi, T.A.2    Sarkani, S.3
  • 19
    • 70449371464 scopus 로고    scopus 로고
    • Neural network based intrusion detection system for critical infrastructures
    • IJCNN 2009. International Joint Conference on IEEE
    • O. Linda, T. Vollmer, and M. Manic. Neural network based intrusion detection system for critical infrastructures. In Neural Networks, 2009. IJCNN 2009. International Joint Conference on, pages 1827-1834. IEEE, 2009.
    • (2009) Neural Networks, 2009 , pp. 1827-1834
    • Linda, O.1    Vollmer, T.2    Manic, M.3
  • 20
    • 84909595154 scopus 로고    scopus 로고
    • Intrusion detection in scada systems using machine learning techniques
    • Aug
    • L. Maglaras and J. Jiang. Intrusion detection in scada systems using machine learning techniques. In Science and Information Conference (SAI), 2014, pages 626-631, Aug 2014.
    • (2014) Science and Information Conference (SAI), 2014 , pp. 626-631
    • Maglaras, L.1    Jiang, J.2
  • 21
    • 84921327876 scopus 로고    scopus 로고
    • Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems
    • R. Mitchell and I.-R. Chen. Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. Dependable and Secure Computing, IEEE Transactions on, 12(1):16-30, 2015.
    • (2015) Dependable and Secure Computing, IEEE Transactions On , vol.12 , Issue.1 , pp. 16-30
    • Mitchell, R.1    Chen, I.-R.2
  • 24
    • 84910094055 scopus 로고    scopus 로고
    • Norms in one-class classification for intrusion detection in scada systems
    • P. Nader, P. Honeine, and P. Beauseroy. -norms in one-class classification for intrusion detection in scada systems. Industrial Informatics, IEEE Transactions on, 10(4):2308-2317, 2014.
    • (2014) Industrial Informatics, IEEE Transactions On , vol.10 , Issue.4 , pp. 2308-2317
    • Nader, P.1    Honeine, P.2    Beauseroy, P.3
  • 26
    • 84978923893 scopus 로고    scopus 로고
    • Intrusion detection system: A hybrid approach for cyber-physical environments
    • J. M. B. Palácios, J. R. B. Garay, A. M. Oliveira, and S. T. Kofuji. Intrusion detection system: A hybrid approach for cyber-physical environments. Technology, 39:193-204, 2013.
    • (2013) Technology , vol.39 , pp. 193-204
    • Palácios, J.M.B.1    Garay, J.R.B.2    Oliveira, A.M.3    Kofuji, S.T.4
  • 32
    • 34247636165 scopus 로고    scopus 로고
    • Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
    • C.-H. Tsang, S. Kwong, and H. Wang. Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recognition, 40(9):2373-2391, 2007.
    • (2007) Pattern Recognition , vol.40 , Issue.9 , pp. 2373-2391
    • Tsang, C.-H.1    Kwong, S.2    Wang, H.3
  • 35
    • 0036647172 scopus 로고    scopus 로고
    • Multivariate statistical analysis of audit trails for host-based intrusion detection
    • N. Ye, S. M. Emran, Q. Chen, and S. Vilbert. Multivariate statistical analysis of audit trails for host-based intrusion detection. Computers, IEEE Transactions on, 51(7):810-820, 2002.
    • (2002) Computers, IEEE Transactions On , vol.51 , Issue.7 , pp. 810-820
    • Ye, N.1    Emran, S.M.2    Chen, Q.3    Vilbert, S.4
  • 36
    • 82155167665 scopus 로고    scopus 로고
    • Distributed intrusion detection system in a multi-layer network architecture of smart grids
    • Y. Zhang, L. Wang, W. Sun, R. C. Green, M. Alam, et al Distributed intrusion detection system in a multi-layer network architecture of smart grids. Smart Grid, IEEE Transactions on, 2(4):796-808, 2011.
    • (2011) Smart Grid, IEEE Transactions On , vol.2 , Issue.4 , pp. 796-808
    • Zhang, Y.1    Wang, L.2    Sun, W.3    Green, R.C.4    Alam, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.