Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2017
DOI: 10.7763/ijcte.2017.v9.1169
|View full text |Cite
|
Sign up to set email alerts
|

Deep Feature Extraction for multi-Class Intrusion Detection in Industrial Control Systems

Abstract: Abstract-In recent days, network based communication is more vulnerable to outsider and insider attacks due to its wide spread applications in different domains. Intrusion detection is a key task for defense-in depth strategy of the communication networks. In order to defend properly against growing threats, Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) need to incorporate this technology. Intrusion Detection System (IDS), a software application or a hardware which is ab… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…The application of HBOS with dynamic bins showed better results compared to other related methods, especially those detecting R2L and U2R types of attacks. A comparison of results based on the NSL-KDD dataset with other approaches [11][12][13][14][15] is listed in Table 2. The application of HBOS with dynamic bins showed better results compared to other related methods, especially those detecting R2L and U2R types of attacks.…”
Section: Resultsmentioning
confidence: 99%
“…The application of HBOS with dynamic bins showed better results compared to other related methods, especially those detecting R2L and U2R types of attacks. A comparison of results based on the NSL-KDD dataset with other approaches [11][12][13][14][15] is listed in Table 2. The application of HBOS with dynamic bins showed better results compared to other related methods, especially those detecting R2L and U2R types of attacks.…”
Section: Resultsmentioning
confidence: 99%
“…Because of network bandwidth and data increase, [23] proposes a deep packet inspection in order to learn the necessary feature that would allow DoS, Probe, R2L and U2R attacks detection. The authors used a Deep Neural Networks (DNN) approach which architecture is a stacked auto-encoders for the feature learning, to which a softmax layer is added for the classification ( However, the approach proposed by [23] gives promising results in feature learning and good detection rate for some classes of attacks detection. It uses the NSL-KDD dataset for the experiment.…”
Section: Stacked Auto-encoder Based Anomaly Detectionmentioning
confidence: 99%
“…However, this method had a difficulty in dealing with the unbalanced data and small samples. Potluri et al [22] used DBN for feature extraction, and softmax and SVM for classification at the end of the network. The detection accuracy of categories of attacks on the NSL-KDD dataset was 80-90%, while that of small categories was about 20%.…”
Section: Related Work a Machine Learning Based Intrusion Detectimentioning
confidence: 99%