2023
DOI: 10.3390/app13137774
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging Graph-Based Representations to Enhance Machine Learning Performance in IIoT Network Security and Attack Detection

Abstract: In the dynamic and ever-evolving realm of network security, the ability to accurately identify and classify portscan attacks both inside and outside networks is of paramount importance. This study delves into the underexplored potential of fusing graph theory with machine learning models to elevate their anomaly detection capabilities in the context of industrial Internet of things (IIoT) network data analysis. We employed a comprehensive experimental approach, encompassing data preprocessing, visualization, f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 40 publications
0
1
0
Order By: Relevance
“…The widely different techniques applied for detecting attacks extensively are classified into three main kinds, such as misuse-based, hybrid-based, and anomaly-based identification [12]. In the detection technique of misuse-based cyber attacks, they can be examined with pre-recorded attack signatures, and the technique is utilized significantly for detecting the identified attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The widely different techniques applied for detecting attacks extensively are classified into three main kinds, such as misuse-based, hybrid-based, and anomaly-based identification [12]. In the detection technique of misuse-based cyber attacks, they can be examined with pre-recorded attack signatures, and the technique is utilized significantly for detecting the identified attacks.…”
Section: Introductionmentioning
confidence: 99%