2019
DOI: 10.3233/jifs-169960
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Rough Set Theory based Feature Selection Approach for Intrusion Detection in SCADA Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 29 publications
0
7
0
Order By: Relevance
“…The error backpropagation has been regarded as a gradient descent method, which can usually be used to solve the gradient problem. The global gradient solution is transformed into the local gradient solution, which simplifies the calculation process [24]. The current output of a sequence of recurrent neural networks (RNN) is affected by both the current input and the previous output.…”
Section: Long-short-term Memory Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…The error backpropagation has been regarded as a gradient descent method, which can usually be used to solve the gradient problem. The global gradient solution is transformed into the local gradient solution, which simplifies the calculation process [24]. The current output of a sequence of recurrent neural networks (RNN) is affected by both the current input and the previous output.…”
Section: Long-short-term Memory Networkmentioning
confidence: 99%
“…Therefore, intrusion data presents the characteristics of large samples and high dimensions. When the PCA feature extraction model is applied to a large number of data samples, the problem of incomplete feature expression will lead to an increase in the false-positive rate of detection [24]. Deep learning has more advantages in processing large samples and high-dimensional data.…”
Section: Introductionmentioning
confidence: 99%
“…An anomaly detector can be considered as a black box that receives data in real-time from an operational plant, such as SWaT. Generally, the application of machine learning algorithms for anomaly detection in ICS can be broadly categorized (i) Models that operates over the relationship among the feature vectors for anomaly detection [25,28], and (ii) models that predict the behavior of ICS and detects anomalies in case of any discrepancies between the actual and predicted behavior [29]. These models are built using data from an operational plant where the detector is intended to be deployed.…”
Section: Anomalies Detection and Development Stagesmentioning
confidence: 99%
“…Challenge 1: Supervised vs unsupervised Learning: Recently, there have been studies where supervised machine learning is used for attack detection [7,14,[25][26][27]. Although these models possess a high detection rate and generate few false alarms for known attacks, they fail to detect the unknown or new attacks due to the lack of signatures.…”
Section: Challenges: Model Creationmentioning
confidence: 99%
“…The experimental outcome determines the scope and significant dissemination direction of finding events from a new perspective which demonstrates 96% of improved event detection accuracy. In [5], authors propose a novel filter-based feature selection approach for the identification of informative features based on Rough Set Theory and Hyper-clique based Binary Whale Optimization Algorithm (RST-HCBWoA). Experiments were carried out by Power system attack dataset and the performance of RST-HCBWoA was evaluated in terms of reduct size, precision, recall, classification accuracy, and time complexity.…”
mentioning
confidence: 99%