2021
DOI: 10.1016/j.compind.2021.103509
|View full text |Cite
|
Sign up to set email alerts
|

Detecting cyberattacks using anomaly detection in industrial control systems: A Federated Learning approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 111 publications
(34 citation statements)
references
References 38 publications
0
24
0
Order By: Relevance
“…Furthermore, the authors of [18] did not account for the model training time, which is the major drawback of LSTM and GRU. Work [19] proposed a cyberattacks detection mechanism using the combination of Variational Autoencoder (VAE) and LSTM. Although the detection performance is considerably high, the model in [19] faces difficulty in terms of running time since the LSTM block requires a long training time.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Furthermore, the authors of [18] did not account for the model training time, which is the major drawback of LSTM and GRU. Work [19] proposed a cyberattacks detection mechanism using the combination of Variational Autoencoder (VAE) and LSTM. Although the detection performance is considerably high, the model in [19] faces difficulty in terms of running time since the LSTM block requires a long training time.…”
Section: Related Workmentioning
confidence: 99%
“…Work [19] proposed a cyberattacks detection mechanism using the combination of Variational Autoencoder (VAE) and LSTM. Although the detection performance is considerably high, the model in [19] faces difficulty in terms of running time since the LSTM block requires a long training time. Liu et al [20] presented an attention CNN-LSTM model within a FL framework for anomaly detection in IIoT edge devices.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…[91], [92], [93], [94] [95], [96], [97], [98] [99], [100], [101], [102], [103] [104], [105], [106], [107], [108] Fig. 2: Existing Deep Learning Federated Intrusion Detection Systems by model architecture.…”
Section: Mlp Ae Vanillamentioning
confidence: 99%
“…Huong et al [92] proposed a cyberattack anomaly detection system for Industrial Internet of Things (IIoT) systems. In order to detect anomalies in time series data, they use a model architecture composed of an VAE-Encoder, an LSTM unit and an VAE-Decoder.…”
Section: Mlp Ae Vanillamentioning
confidence: 99%