[HTML][HTML] Early Intrusion Detection System using honeypot for industrial control networks

A Pashaei, ME Akbari, MZ Lighvan, A Charmin - Results in Engineering, 2022 - Elsevier
Abstract Man-in-the-Middle (MITM) and Distributed Denial of Service (DDoS) attacks are
significant threats, especially to Industrial Control Systems (ICS). The honeypot is one of the …

Developing cybersecurity systems based on machine learning and deep learning algorithms for protecting food security systems: industrial control systems

H Alkahtani, THH Aldhyani - Electronics, 2022 - mdpi.com
Industrial control systems (ICSs) for critical infrastructure are extensively utilized to provide
the fundamental functions of society and are frequently employed in critical infrastructure …

[HTML][HTML] A MEC-IIoT intelligent threat detector based on machine learning boosted tree algorithms

S Ruiz-Villafranca, J Roldán-Gómez… - Computer Networks, 2023 - Elsevier
In recent years, new management methods have appeared that mark the beginning of a new
industrial revolution called Industry 4.0 or the Industrial Internet of Things (IIoT). IIoT brings …

A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications

TO Browne, M Abedin, MJM Chowdhury - International Journal of …, 2024 - Springer
This paper presents a systematic review to identify research combining artificial intelligence
(AI) algorithms with Open source intelligence (OSINT) applications and practices. Currently …

One-Dimensional Convolutional Wasserstein Generative Adversarial Network Based Intrusion Detection Method for Industrial Control Systems

Z Cai, H Du, H Wang, J Zhang, Y Si, P Li - Electronics, 2023 - mdpi.com
The imbalance between normal and attack samples in the industrial control systems (ICSs)
network environment leads to the low recognition rate of the intrusion detection model for a …

Validating an emulation-based cybersecurity model with a physical testbed

H Huang, P Wlazlo, A Sahu, A Walker… - … on Dependable and …, 2023 - ieeexplore.ieee.org
For researchers studying cyber-physical system security, working with realistic datasets is
essential. To produce the datasets, the existing methodology is to emulate the cyber …

Honeypot Based Industrial Threat Detection Using Game Theory in Cyber-Physical System

X Zhou, L Almutairi, TR Alsenani, MN Ahmad - Journal of Grid Computing, 2023 - Springer
Cyber threats are clearly understood across the security landscape using honeypot
technologies across industrial cyber-physical systems (ICPS). Specifically, Distributed …

STRAYER: A Smart Grid adapted automation architecture against cyberattacks

AO Paula, RI Meneguette, FT Giuntini… - Journal of Information …, 2022 - Elsevier
Even with advances in Smart Grids and their cybersecurity recommendations, recent attacks
on automation and protection systems of these structures show that it is still necessary to …

Anti-attack intrusion detection model based on MPNN and traffic spatiotemporal characteristics

J Lu, J Lan, Y Huang, M Song, X Liu - Journal of Grid Computing, 2023 - Springer
Considering the robustness and accuracy of conventional intrusion detection models are
easily influenced by adversarial attacks, this work proposes an anti-attack intrusion detection …

Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression

JH Lee, IH Ji, SH Jeon, JT Seo - Sensors, 2023 - mdpi.com
Cyber threats to industrial control systems (ICSs) have increased as information and
communications technology (ICT) has been incorporated. In response to these cyber threats …