2021
DOI: 10.1007/s10586-021-03426-w
|View full text |Cite
|
Sign up to set email alerts
|

A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems

Abstract: Presently, Supervisory Control and Data Acquisition (SCADA) systems are broadly adopted in remote monitoring large-scale production systems and modern power grids. However, SCADA systems are continuously exposed to various heterogeneous cyberattacks, making the detection task using the conventional intrusion detection systems (IDSs) very challenging. Furthermore, conventional security solutions, such as firewalls, and antivirus software, are not appropriate for fully protecting SCADA systems because they have … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(11 citation statements)
references
References 50 publications
0
11
0
Order By: Relevance
“…In order to test the overall detection performance of intrusion data, this paper takes the KDD99 data set as the benchmark method, uses reference [22,25] as the comparison method, and runs in the same experimental environment as the M-CNN detection method to verify the optimal performance of the proposed method.…”
Section: Analysis Of Detection Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to test the overall detection performance of intrusion data, this paper takes the KDD99 data set as the benchmark method, uses reference [22,25] as the comparison method, and runs in the same experimental environment as the M-CNN detection method to verify the optimal performance of the proposed method.…”
Section: Analysis Of Detection Resultsmentioning
confidence: 99%
“…Reference [22] proposed an intrusion detection system based on deep learning for the multi-cloud Internet of things environment, and the feasibility of the method was verified based on the NSL-KDD data set; Reference [23] determined the network security level, constructed a security intrusion detection system based on real-time sequence and extreme learning machine model, and analyzed the state of the Internet of things network. Based on the security interoperability requirements of the Internet of things, reference [24] built a distributed intrusion detection model based on the bidirectional long and short-term memory model to realize the network protection of the Internet of things for smart contracts; Reference [25] adopted the stacking depth learning method to analyze and determine the network state of the SCADA system in the power network. Reference [26] proposed a new unsupervised dimensionality reduction method to detect network attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Wang et al, [15] Apart from firewall security, conventional security systems are required for Supervisory control and Data acquisition (SCADA) is discussed in which deep learning approach is evaluated. It detects the malicious attacks in the SCADA environment and investigates the protection criteria of cyber-attacks detection process.…”
Section: A Related Workmentioning
confidence: 99%
“…Deep network can not only obtain the maximum reward from the high-dimensional and massive network data environment but also have the exploration function and automatically mine more valuable information in the network environment [ 14 16 ]. Therefore, many scholars have carried out research studies and analyses using deep learning network.…”
Section: Introductionmentioning
confidence: 99%