2022
DOI: 10.12720/jait.13.5.456-461
|View full text |Cite
|
Sign up to set email alerts
|

GAAINet: A Generative Adversarial Artificial Immune Network Model for Intrusion Detection in Industrial IoT Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Additionally, Sithungu and Ehlers 56 introduced an intrusion detection model designed for Industrial Internet of Things (IIoT) systems. Their model, called GAAINet, integrated concepts from GANs and artificial immune networks.…”
Section: Nature‐inspired Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, Sithungu and Ehlers 56 introduced an intrusion detection model designed for Industrial Internet of Things (IIoT) systems. Their model, called GAAINet, integrated concepts from GANs and artificial immune networks.…”
Section: Nature‐inspired Algorithmsmentioning
confidence: 99%
“…and firefly algorithm-optimized routing scheme for ensuring secure and reliable data communication in IoT-based healthcare environments.Additionally, Sithungu and Ehlers56 introduced an intrusion detection model designed for Industrial Internet of Things (IIoT) systems. Their model, called GAAINet, integrated concepts from GANs and artificial immune networks.…”
mentioning
confidence: 99%
“…Deep neural networks (DNNs), a key branch of artificial intelligence [1], have achieved considerable success in diverse domains. DNNs have found applications in a variety of critical systems including image recognition [2], speech recognition [3], vehicle detection [4], image coloring [5] and Intrusion Detection [6]. However, studies have revealed the susceptibility of DNNs to adversarial attacks [7], involving the introduction of subtle perturbations to the input.…”
Section: Introductionmentioning
confidence: 99%
“…However, the high degree of heterogeneity [3] that characterizes this environment makes this operation very difficult, due to both the continuous efforts of the attackers to violate the systems with more and more sophisticated techniques (a case in point is the difficulty of detecting the zero-day attacks [4]), and the problem that many attacks are often characterized by a behavior very similar to that of a legitimate network activity [5], making it difficult to detect them. To face these problems, researchers are constantly looking for more and more efficient Intrusion Detection Systems (IDSs) [6], which are designed using various techniques such as, just to name a few, those based on Machine Learning and Deep Learning [7,8], Artificial Intelligence [9], Artificial Neural Networks [10][11][12][13], Fuzzy Logic [14], often combining more than one to define hybrid solutions [15]. Starting from the consideration that most of the approaches and strategies in the literature related to the IDS domain exploit the entire training set to define the classification model [5,[16][17][18], we have trivially observed that a training dataset refers to single events in terms of data rows and to the different features that characterize each event in terms of data columns.…”
Section: Introductionmentioning
confidence: 99%