2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM) 2019
DOI: 10.1109/pacrim47961.2019.8985116
|View full text |Cite
|
Sign up to set email alerts
|

LSTM for SCADA Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…The models used the LSTM algorithm. Both detection systems performed well in detecting temporally uncorrelated attacks [25].…”
Section: Literature Studies On Scada Securitymentioning
confidence: 98%
See 1 more Smart Citation
“…The models used the LSTM algorithm. Both detection systems performed well in detecting temporally uncorrelated attacks [25].…”
Section: Literature Studies On Scada Securitymentioning
confidence: 98%
“…Then, the packets of these 6 scenarios were collected in a single file and the total dataset was created. The features frequently used in the literature and specific to the Modbus TCP/IP protocol were determined for this dataset [23,25]. Table 1 shows the features used in this research.…”
Section: Dataset From the Testbedmentioning
confidence: 99%
“…In [29], both a many-to-many and a many-to-one LSTM are designed to address intrusion detection systems for the supervisory control and data acquisition (SCADA) protocol, and their results are compared.…”
Section: Sequence Labelingmentioning
confidence: 99%
“…An interesting option is to use LSTM neural networks to establish a protection mechanism against cyber-attacks [ 64 , 65 , 66 ]. LSTMs can learn the temporal behavior of time series sequences.…”
Section: Experimental Evaluation Of Lstm Neural Network In the Scada ...mentioning
confidence: 99%