2022
DOI: 10.3390/app12062765
|View full text |Cite
|
Sign up to set email alerts
|

Research on a PSO-H-SVM-Based Intrusion Detection Method for Industrial Robotic Arms

Abstract: The automation and intelligence of industrial manufacturing is the core of the fourth industrial revolution, and robotic arms and proprietary networked information systems are an integral part of this vision. However, with the benefits come risks that have been overlooked, and robotic arms have become a heavily attacked area. In order to improve the security of the robotic arm system, this paper proposes an intrusion detection method based on a state classification model. The closure operation process of the r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…Finally, in order to test the classification ability of different attacks, including known and unknown attacks, we use the Detection Rate (DR) as another evaluation metric for model evaluation. DR reflects the ability of the model to classify abnormal samples, which is defined as follows [27]:…”
Section: Evaluation Metricsmentioning
confidence: 99%
“…Finally, in order to test the classification ability of different attacks, including known and unknown attacks, we use the Detection Rate (DR) as another evaluation metric for model evaluation. DR reflects the ability of the model to classify abnormal samples, which is defined as follows [27]:…”
Section: Evaluation Metricsmentioning
confidence: 99%
“…Another widely used method is intrusion detection based on evolutionary computation. For example, in reference [7], feature selection based on particle swarm optimization algorithm, feature selection and non-selection codes 0 and 1, but KDD (Knowledge Discovery in Database) data set alone had 41 attributes. If all features were coded with it, the amount of calculation was too large, which would easily lead to information redundancy.…”
Section: Introductionmentioning
confidence: 99%