2017 IEEE International Conference on Big Data (Big Data) 2017
DOI: 10.1109/bigdata.2017.8258164
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid model for anomaly-based intrusion detection in SCADA networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 48 publications
(30 citation statements)
references
References 18 publications
0
29
0
Order By: Relevance
“…Ullah and Mahmoud [19] suggested an IDS using a combination of J48 and I Bayes techniques. J48 is a type of decision tree (DT) technique.…”
Section: A Integritymentioning
confidence: 99%
See 1 more Smart Citation
“…Ullah and Mahmoud [19] suggested an IDS using a combination of J48 and I Bayes techniques. J48 is a type of decision tree (DT) technique.…”
Section: A Integritymentioning
confidence: 99%
“…As mentioned in Section IV-A, Ullah and Mahmoud [19] covered confidentiality problem through reconnaissance attack.…”
Section: Confidentialitymentioning
confidence: 99%
“…An intrusion detection framework for smart-grid was proposed in [12]. The training and testing time can be significantly decreased by using a simplified set of features [13]. A filter-based feature selection model proposed [13,14] removing redundant and irrelevant features from the ISCX and NSL-KDD datasets.…”
Section: Related Workmentioning
confidence: 99%
“…The training and testing time can be significantly decreased by using a simplified set of features [13]. A filter-based feature selection model proposed [13,14] removing redundant and irrelevant features from the ISCX and NSL-KDD datasets. Umer et al [5] deliberate techniques and challenges for flow-based intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
“…A hybrid machine learning approach was designed to recognize zero-day attacks in Supervisory Control and Data Acquisition (SCADA) networks [8]. In order to achieve better results, filter-based feature selection approach was used to elicit appropriate features.…”
Section: Introduction and Related Workmentioning
confidence: 99%