2021
DOI: 10.1002/int.22384
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent deception techniques against adversarial attack on the industrial system

Abstract: Community detection algorithms (CDAs) are aiming to group nodes based on their connections and play an essential role in the complex system analysis. However, for privacy reasons, we may want to prevent communities or a group of nodes in the complex industrial network from being discovered in some instances, leading to the topics on community deception. In this paper, we introduce and formalize two intelligent community deception methods to conceal the nodes from various CDAs. We used node‐based matrices, pers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 32 publications
(12 citation statements)
references
References 38 publications
(69 reference statements)
0
6
0
Order By: Relevance
“…They detect misuse of attempts either by a legal person or by third parties [4]. Break-in security vulnerabilities, misuse of the system are attacks that the IDS can identify [5][6][7][8][9]. Analysis of the transmitted packet in a network and through the collection of data, IDS worked [10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…They detect misuse of attempts either by a legal person or by third parties [4]. Break-in security vulnerabilities, misuse of the system are attacks that the IDS can identify [5][6][7][8][9]. Analysis of the transmitted packet in a network and through the collection of data, IDS worked [10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…Researchers have effectively responded to the need for protecting information by proposing many encryption techniques [1][2][3][4][5][6][7][8][9][10][11][12]. These techniques can be categorized either by how they process their input (stream or block ciphers) or by the shared information between the communicating parties (symmetric or asymmetric).…”
Section: Introductionmentioning
confidence: 99%
“…Deceptive defense [83] ideas have emerged in recent years, and combining deceptive defense methods with MTD could be a future research trend. There is already a trend of combining deceptive defense with intelligence [81], where deceptive defense provides misleading information by actively exposing false intelligence of the protected system, thus allowing the attacker to move the attack in the direction of favoring the defender by actively creating and reinforcing the observation and identification of deceptive information.…”
mentioning
confidence: 99%