2018 International Russian Automation Conference (RusAutoCon) 2018
DOI: 10.1109/rusautocon.2018.8501783
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of GAN Applicability for Intrusion Detection in Self-Organizing Networks of Cyber Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 46 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…Considering that large volumes of multidimensional data are generated in 6G IIoT, the authors in [14] designed an autoregressive exogenous model (ARX) for eliminating the noise in data for anomaly detection, and a multidimensional data relationship diagram is creatively used to characterize the spatiotemporal correlations among heterogeneous data. The authors in [73] applied CGANs to search for security anomalies, noting that the discriminator needs to be trained for more steps than the generator to ensure that their loss curves converge.…”
Section: A Anomaly Detectionmentioning
confidence: 99%
“…Considering that large volumes of multidimensional data are generated in 6G IIoT, the authors in [14] designed an autoregressive exogenous model (ARX) for eliminating the noise in data for anomaly detection, and a multidimensional data relationship diagram is creatively used to characterize the spatiotemporal correlations among heterogeneous data. The authors in [73] applied CGANs to search for security anomalies, noting that the discriminator needs to be trained for more steps than the generator to ensure that their loss curves converge.…”
Section: A Anomaly Detectionmentioning
confidence: 99%
“…Belenko et al [22] examined the GAN's applicability for intrusion detection and found it to be more promising than a traditional ANN for dealing with real-world problems. They came to the conclusion that GAN-based networks may be used to look for security anomalies and cyber hazards, as well as to generate more anomalies to improve the quality of the flagged data samples.…”
Section: Related Workmentioning
confidence: 99%
“…The authors, after testing their approach on the SWaT and Water Distribution (WADI) datasets concluded that their method is effective in detective anomalies caused by cyber attacks in CPS. The use of GAN was also proposed for identifying security anomalies and cyber threats in the self-organizing networks of CPS [105]. The authors as part of their future works intend to use the proposed model to secure a self-learning VANET/MANET.…”
Section: B Generative Adversarial Network (Gan) For Resilient Cpsmentioning
confidence: 99%