2021
DOI: 10.1016/j.ijcip.2021.100430
|View full text |Cite
|
Sign up to set email alerts
|

ARTINALI#: An Efficient Intrusion Detection Technique for Resource-Constrained Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…However, the heterogeneity of devices currently means that a separate solution is required for each type of device. That is why most researchers propose an HIDS focused on a single or few device types (e.g., a smart artificial pancreas [133], a smart-connected-pacemaker [101], or a diabetes management control system [44]). The transferability of these approaches to the real world and, in particular, scalability are problems that are often not addressed by researchers.…”
Section: Advancing Standardization Projectsmentioning
confidence: 99%
“…However, the heterogeneity of devices currently means that a separate solution is required for each type of device. That is why most researchers propose an HIDS focused on a single or few device types (e.g., a smart artificial pancreas [133], a smart-connected-pacemaker [101], or a diabetes management control system [44]). The transferability of these approaches to the real world and, in particular, scalability are problems that are often not addressed by researchers.…”
Section: Advancing Standardization Projectsmentioning
confidence: 99%
“…Several botnets carry out attacks at the same time with simultaneous characteristics, which are substantially more intense than sporadic and periodic attacks. Most detection systems, especially models that use clustering and deep learning techniques, consume many resources, causing problems when the detection is carried out at the same time in a short time frame [5 , 6] . The proposed dataset has the characteristics of simultaneous attacks in a short period, so the security system must survive resource problems when dealing with botnet attacks.…”
Section: Data Descriptionmentioning
confidence: 99%