2021 IEEE 12th Annual Ubiquitous Computing, Electronics &Amp; Mobile Communication Conference (UEMCON) 2021
DOI: 10.1109/uemcon53757.2021.9666607
|View full text |Cite
|
Sign up to set email alerts
|

Boosting-based Models with Tree-structured Parzen Estimator Optimization to Detect Intrusion Attacks on Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…The bridge dimensions establish that the IE signals were collected from a large surface area, demonstrating that the IE signals in this study were generalized and diverse compared to previous research [24]. A balanced dataset can be crucial for developing robust machine learning and artificial neural networks [30][31][32][33][34][35]. We used four training models based on IE signals in two classes.…”
Section: Impact-echo Dataset and Classificationmentioning
confidence: 78%
See 1 more Smart Citation
“…The bridge dimensions establish that the IE signals were collected from a large surface area, demonstrating that the IE signals in this study were generalized and diverse compared to previous research [24]. A balanced dataset can be crucial for developing robust machine learning and artificial neural networks [30][31][32][33][34][35]. We used four training models based on IE signals in two classes.…”
Section: Impact-echo Dataset and Classificationmentioning
confidence: 78%
“…SDNET2021 contains 1573 IE signals from four bridges in total. Under sampling is an approach used to create a balanced dataset by maintaining all of the data in the smaller class and reducing the size of the data in the larger class [30][31][32][33][34][35]. A balanced training set was created using an under-sampling strategy in this study.…”
Section: Impact-echo Dataset and Classificationmentioning
confidence: 99%
“…The results show that the stacking technique provides satisfactory results. In [114], the authors use boosting ensemble technique along with Tree-structured Parzen Estimator Optimization to detect and classify attacks on smart grid. The authors show that optimization techniques improve the detection performance of the mode.…”
Section: Ai-based Techniquesmentioning
confidence: 99%
“…It should be noted that most of the proposed methods have only included CIC-IDS2017 or CSE-CIC-IDS2018 in their analysis. Reference [13] included CIC-DoS2017 (besides IDS2017 and IDS2018), references [14] and [15] were validated on CIC-DDoS2019 and reference [16] included all four CIC datasets.…”
Section: B Proposed Ml-ids Detection and Feature Selection Systemsmentioning
confidence: 99%
“…CIC Collection (IDS17, IDS18, DoS17, DDoS19) [27] 2020 PSH flag count, fwd packet length min, bwd packet length min, down/up ratio [28] 2020 protocol, down/up ratio, active std [13] 2021 PSH flag count, active std [16] 2021 fwd packet length min, packet length min, PSH flag count, ACK flag count [14] 2021 protocol, bwd packet length min [15] 2021 packet length min, bwd packet length min [29] 2022 PSH flag count, packet length min, protocol, fwd packet length min, bwd packet length min active std, idle std, ACK flag count, ECE flag count, RST flag count, down/up ratio [33]) proposed for cyber security ML systems on six criteria. They conclude that white-box techniques (full model access) such as integrated gradients and layer-wise relevance propagation comply best with the tested criteria.…”
Section: Yearmentioning
confidence: 99%