Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2017 IEEE Colombian Conference on Communications and Computing (COLCOM) 2017
DOI: 10.1109/colcomcon.2017.8088210
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection system for SCADA platforms through machine learning algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…Maglaras et al [35] modeled a OCSVM model for detecting cyberintrusions in a designed small SCADA testbed. Prisco and Duitama [95] also proposed OCSVM for detecting intrusions on SCADA network. In a related work, Fang et al [96] modelled a support vector regression for predicting a SCADA monitoring data.…”
Section: Support Vector Machine (Svm)mentioning
confidence: 99%
“…Maglaras et al [35] modeled a OCSVM model for detecting cyberintrusions in a designed small SCADA testbed. Prisco and Duitama [95] also proposed OCSVM for detecting intrusions on SCADA network. In a related work, Fang et al [96] modelled a support vector regression for predicting a SCADA monitoring data.…”
Section: Support Vector Machine (Svm)mentioning
confidence: 99%
“…Both [42] and [43] presented an IDS that detects malicious network traffic in SCADA systems, based on One Class Support Vector Machine (OCSVM) technique. While authors of [42] use OCSVM to classify malicious observations by comparing them with benign ones, the study carried out in [43] aims at detecting intruders in SCADA networks by analysing variables of the control devices. Two different approaches of one-class classification, the Support Vector Data Description (SVDD) and the Kernel Principle Component Analysis (KPCA), were proposed as well in [44].…”
Section: Related Workmentioning
confidence: 99%
“…Also, the matching prediction is highly complicated due to the presence of more irrelevant features in the database [14]. Thus, the existing works could use the machine learning techniques [15,16] for selecting the best matching features between the query data and set of extracted features. The different types of machine learning [17][18][19][20][21] techniques used in the conventional works are Support Vector Machine (SVM), Relevance Vector Machine (RVM), Neural Networks (NN), and other deep learning models.…”
Section: Introductionmentioning
confidence: 99%