2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) 2021
DOI: 10.1109/hora52670.2021.9461273
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Anomaly Detection Approaches Performed Through Deep Learning Methods in SCADA Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 20 publications
0
11
0
Order By: Relevance
“…Atunay et al. [20] presented a comprehensive analysis of various deep learning models used for detecting anomalies in the SCADA systems. Typically, the IDS was mainly developed to minimize the cyber‐threats in the networking systems.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Atunay et al. [20] presented a comprehensive analysis of various deep learning models used for detecting anomalies in the SCADA systems. Typically, the IDS was mainly developed to minimize the cyber‐threats in the networking systems.…”
Section: Related Workmentioning
confidence: 99%
“…However, this framework has the limitations of inefficient detection, increased error outputs, and overfitting. Atunay et al [20] presented a comprehensive analysis of various deep learning models used for detecting anomalies in the SCADA systems. Typically, the IDS was mainly developed to minimize the cyber-threats in the networking systems.…”
Section: Related Workmentioning
confidence: 99%
“…SCADA is a well-established computer-based automate system used to gather realtime data from remote or local equipment such as programmable logic controller, remote terminal unit (RTU), intelligent electronic devices (IED) and human machine interface (HMI), etc. [45]- [48]. Figure 4 explains the block diagram of SCADA architecture connected from operation center, energy management and distribution systems (EMS and DMS) through control room to the substation.…”
Section: Artificial Intelligence In Scada Intrusion Detectionmentioning
confidence: 99%
“…Over the last two decades, connecting SCADA networks to the internet has become essential due to performance and commercial needs. Hence, SCADA network's complexity and interconnectivity has increased [47]- [48]. SCADA networks are made to adopt Transmission control protocol/internet protocol and are accessible via internet and corporate networks, they are vulnerable to cyberattacks.…”
Section: Fig 4 Illustration Of Scada Infrastructurementioning
confidence: 99%
See 1 more Smart Citation