2023
DOI: 10.1007/s10586-023-04087-7
|View full text |Cite
|
Sign up to set email alerts
|

Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…A. Abid et al [31] introduced a real-time, distributed, faulttolerant and scalable system for detecting DDoS attacks in Edge-IIoT dataset by leveraging data fusion and big data technologies such as Kafka and Spark Streaming. They achieved the high accuracy of 99.97% and 99.98% in binary and multiclass classification respectively when multilayer perceptron is used.…”
Section: A Handling Of Vast Amounts Of Streaming Iot Trafficmentioning
confidence: 99%
“…A. Abid et al [31] introduced a real-time, distributed, faulttolerant and scalable system for detecting DDoS attacks in Edge-IIoT dataset by leveraging data fusion and big data technologies such as Kafka and Spark Streaming. They achieved the high accuracy of 99.97% and 99.98% in binary and multiclass classification respectively when multilayer perceptron is used.…”
Section: A Handling Of Vast Amounts Of Streaming Iot Trafficmentioning
confidence: 99%
“…Threats that result in defects in program design are found using the firewall for IDS. Moreover, the IDS [29,30] makes it possible for forensic suspicion to recognize the program administrator's defenses against cyber threats. Systems for detecting intrusions into networks and systems are available.…”
Section: Introductionmentioning
confidence: 99%
“…Its allure originated from its inherent cost-efficiency and remarkable reliability, which allowed organizations to scale their operations with unprecedented flexibility. However, with the increasing reliance on cloud infrastructure, there emerged an ominous and ever-present threat of cyberattacks [3][4][5]. These nefarious assaults on digital infrastructure disrupt normal system operations, perpetrating malicious activities that compromise data integrity, confidentiality, availability, and privacy.…”
Section: Introductionmentioning
confidence: 99%