Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2019

01-12-2019

Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks

Author: V. M. Krundyshev

Published in: Automatic Control and Computer Sciences | Issue 8/2019

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This article presents an approach to building a system for identifying cyberthreats in modern industrial systems (IIoT, VANET, WSN) by means of artificial intelligence and deep learning. The results of the tests conducted to assess the suggested approach for efficiency based on deep-learning networks are provided.
Literature
1.
go back to reference Zegzhda, D.P. and Ivashko, A.M., Osnovy informatsionnoi bezopasnosti informatsionnykh sistem (Fundamentals of Information Security of Information Systems), Goryachaya liniya—Telekom, 2000. Zegzhda, D.P. and Ivashko, A.M., Osnovy informatsionnoi bezopasnosti informatsionnykh sistem (Fundamentals of Information Security of Information Systems), Goryachaya liniya—Telekom, 2000.
2.
go back to reference Lavrova, D., Pechenkin, A., and Gluhov, V., Applying correlation analysis methods to control flow violation detection in the internet of things, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 735–740.CrossRef Lavrova, D., Pechenkin, A., and Gluhov, V., Applying correlation analysis methods to control flow violation detection in the internet of things, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 735–740.CrossRef
3.
go back to reference Sisinni, E., et al., Industrial Internet of Things: Challenges, opportunities, and directions, IEEE Trans. Ind. Inf., 2018, vol. 14, no. 11, pp. 4724–4734.CrossRef Sisinni, E., et al., Industrial Internet of Things: Challenges, opportunities, and directions, IEEE Trans. Ind. Inf., 2018, vol. 14, no. 11, pp. 4724–4734.CrossRef
4.
go back to reference Singh, R. and Nand, P., Literature review of routing attacks in MANET, 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, 2016, pp. 525–530. Singh, R. and Nand, P., Literature review of routing attacks in MANET, 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, 2016, pp. 525–530.
5.
go back to reference Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, Proceedings of the 11th International Conference on Security of Information and Networks, 2018. Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, Proceedings of the 11th International Conference on Security of Information and Networks, 2018.
6.
go back to reference Ovasapyan, T.D., Ivanov, D.V., and Zegzhda, D.P., Securing wsn networks using the trust model, Regional’naya informatika i informatsionnaya bezopasnost’ (Regional Informatics and Information Security), 2017, pp. 421–422. Ovasapyan, T.D., Ivanov, D.V., and Zegzhda, D.P., Securing wsn networks using the trust model, Regional’naya informatika i informatsionnaya bezopasnost’ (Regional Informatics and Information Security), 2017, pp. 421–422.
7.
go back to reference Haykin, S.S., Neural Networks: A Comprehensive Foundation, Prentice Hall, 1999.MATH Haykin, S.S., Neural Networks: A Comprehensive Foundation, Prentice Hall, 1999.MATH
8.
go back to reference Kalinin, M.O., Krundyshev, V.M., and Semianov, P.V., Architectures for building secure vehicular networks based on SDN technology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 907–914.CrossRef Kalinin, M.O., Krundyshev, V.M., and Semianov, P.V., Architectures for building secure vehicular networks based on SDN technology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 907–914.CrossRef
9.
go back to reference NS-3. http://www.nsnam.org/. NS-3. http://​www.​nsnam.​org/​.​
10.
go back to reference Karmanov, M.L., Routing protocol for ad hoc networks, Vestn. Yuzhno-Ural. Gos. Univ., Ser.: Komp’yut. Tekhnol. Upr. Radioelektron., 2009, no. 10, pp. 47–51. Karmanov, M.L., Routing protocol for ad hoc networks, Vestn. Yuzhno-Ural. Gos. Univ., Ser.: Komp’yut. Tekhnol. Upr. Radioelektron., 2009, no. 10, pp. 47–51.
11.
go back to reference Keras. https://keras.io/. Keras. https://​keras.​io/​.​
12.
go back to reference Tensorflow. https://www.tensorflow.org/. Tensorflow. https://​www.​tensorflow.​org/​.​
13.
go back to reference Deeplearning4j. https://deeplearning4j.org/. Deeplearning4j. https://​deeplearning4j.​org/​.​
14.
go back to reference Theano. http://www.deeplearning.net/software/theano/. Theano. http://​www.​deeplearning.​net/​software/​theano/​.​
Metadata
Title
Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks
Author
V. M. Krundyshev
Publication date
01-12-2019
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2019
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S014641161908011X

Other articles of this Issue 8/2019

Automatic Control and Computer Sciences 8/2019 Go to the issue