2021
DOI: 10.4018/ijaiml.20210701.oa6
|View full text |Cite
|
Sign up to set email alerts
|

Autoencoder Based Anomaly Detection for SCADA Networks

Abstract: Supervisory control and data acquisition (SCADA) systems are industrial control systems that are used to monitor critical infrastructures such as airports, transport, health, and public services of national importance. These are cyber physical systems, which are increasingly integrated with networks and internet of things devices. However, this results in a larger attack surface for cyber threats, making it important to identify and thwart cyber-attacks by detecting anomalous network traffic patterns. Compared… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 42 publications
0
9
0
Order By: Relevance
“…In [20], the researchers used the pigeon inspired optimizer (PIO) to build a feature reduction strategy for IDS. The PIO algorithm draws inspiration from biological processes, namely the interactions between white pigeons and their prey.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [20], the researchers used the pigeon inspired optimizer (PIO) to build a feature reduction strategy for IDS. The PIO algorithm draws inspiration from biological processes, namely the interactions between white pigeons and their prey.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Autoencoders usually include four components: (i) an encoder, allowing to learn the features; (ii) a bottleneck, identified as the layer containing the encoding of the training set; (iii) a decoder, allowing the model to learn how to reconstruct the input data from the encoding; and, (iv) the reconstruction error function, measuring the performance of the model during training. Autoencoders have been applied for intrusion detection tasks [18], anomaly detection [19], and DDoS attack detection [20].…”
Section: 饾憱(饾憽)mentioning
confidence: 99%
“…Although such implementation does not necessitate prior knowledge of the infrastructure, it does necessitate some understanding of how components are arranged in order to reduce training complexity (improving the accuracy of the model). [23] conducted a similar study using a dataset gathered from a gas pipeline. The dataset includes network information (such as IP addresses or packet length), MOD-BUS protocol command payloads (as the MODBUS function code), and data measurements from industrial equipment.…”
Section: Related Workmentioning
confidence: 99%