2023
DOI: 10.1109/tdsc.2022.3143493
|View full text |Cite
|
Sign up to set email alerts
|

USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 45 publications
0
3
0
Order By: Relevance
“…Long Short-Term Memory (LSTM) is another promising ML algorithm for intrusion detection. Alsaedi et al [144] propose a novel framework for detection of malicious behavior in CPS environments through a framework that uses Deep Neural Networks (DNN) to train a ML model to recognize the expected behavior of a complex multi-sensor industrial network. LSTM is used to model temporal sequences from time-series sensor data to capture long-term dependencies and is combined with a novel method of applying different weighting values to focus on the most relevant characteristics in the complex dataset, which improves prediction accuracy by reducing noise in complex datasets.…”
Section: Using Ai/ml For Anomaly Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Long Short-Term Memory (LSTM) is another promising ML algorithm for intrusion detection. Alsaedi et al [144] propose a novel framework for detection of malicious behavior in CPS environments through a framework that uses Deep Neural Networks (DNN) to train a ML model to recognize the expected behavior of a complex multi-sensor industrial network. LSTM is used to model temporal sequences from time-series sensor data to capture long-term dependencies and is combined with a novel method of applying different weighting values to focus on the most relevant characteristics in the complex dataset, which improves prediction accuracy by reducing noise in complex datasets.…”
Section: Using Ai/ml For Anomaly Detectionmentioning
confidence: 99%
“…Perez et al [144] explore the ramifications of continued use of legacy protocols that were designed in the era of fully air-gapped CPS environments and how they can be securely operated in the age of ubiquitous connectivity. Many risks can be mitigated through network segmentation, as described by the Purdue model [233], but the continued use of legacy protocols that operate without encryption or replay resistance against false data injection attacks will leave CPS vulnerable to exploitation.…”
Section: Trusted Systems Vs Zero-trust Architecturementioning
confidence: 99%
“…Furthermore, traditional machine learning (TML) algorithms have advanced significantly, and some of their variants have been successfully applied to solve classification tasks related to intrusion detection [12], [13]. Also, the progression of deep learning (DL) and its great success in different fields has guided it as a potential solution for network intrusion detection [12].…”
Section: Introductionmentioning
confidence: 99%