Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2019

01.12.2019

Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks

verfasst von: V. M. Krundyshev

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2019

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This article presents an approach to building a system for identifying cyberthreats in modern industrial systems (IIoT, VANET, WSN) by means of artificial intelligence and deep learning. The results of the tests conducted to assess the suggested approach for efficiency based on deep-learning networks are provided.
Literatur
1.
Zurück zum Zitat Zegzhda, D.P. and Ivashko, A.M., Osnovy informatsionnoi bezopasnosti informatsionnykh sistem (Fundamentals of Information Security of Information Systems), Goryachaya liniya—Telekom, 2000. Zegzhda, D.P. and Ivashko, A.M., Osnovy informatsionnoi bezopasnosti informatsionnykh sistem (Fundamentals of Information Security of Information Systems), Goryachaya liniya—Telekom, 2000.
2.
Zurück zum Zitat Lavrova, D., Pechenkin, A., and Gluhov, V., Applying correlation analysis methods to control flow violation detection in the internet of things, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 735–740.CrossRef Lavrova, D., Pechenkin, A., and Gluhov, V., Applying correlation analysis methods to control flow violation detection in the internet of things, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 735–740.CrossRef
3.
Zurück zum Zitat Sisinni, E., et al., Industrial Internet of Things: Challenges, opportunities, and directions, IEEE Trans. Ind. Inf., 2018, vol. 14, no. 11, pp. 4724–4734.CrossRef Sisinni, E., et al., Industrial Internet of Things: Challenges, opportunities, and directions, IEEE Trans. Ind. Inf., 2018, vol. 14, no. 11, pp. 4724–4734.CrossRef
4.
Zurück zum Zitat Singh, R. and Nand, P., Literature review of routing attacks in MANET, 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, 2016, pp. 525–530. Singh, R. and Nand, P., Literature review of routing attacks in MANET, 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, 2016, pp. 525–530.
5.
Zurück zum Zitat Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, Proceedings of the 11th International Conference on Security of Information and Networks, 2018. Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, Proceedings of the 11th International Conference on Security of Information and Networks, 2018.
6.
Zurück zum Zitat Ovasapyan, T.D., Ivanov, D.V., and Zegzhda, D.P., Securing wsn networks using the trust model, Regional’naya informatika i informatsionnaya bezopasnost’ (Regional Informatics and Information Security), 2017, pp. 421–422. Ovasapyan, T.D., Ivanov, D.V., and Zegzhda, D.P., Securing wsn networks using the trust model, Regional’naya informatika i informatsionnaya bezopasnost’ (Regional Informatics and Information Security), 2017, pp. 421–422.
7.
Zurück zum Zitat Haykin, S.S., Neural Networks: A Comprehensive Foundation, Prentice Hall, 1999.MATH Haykin, S.S., Neural Networks: A Comprehensive Foundation, Prentice Hall, 1999.MATH
8.
Zurück zum Zitat Kalinin, M.O., Krundyshev, V.M., and Semianov, P.V., Architectures for building secure vehicular networks based on SDN technology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 907–914.CrossRef Kalinin, M.O., Krundyshev, V.M., and Semianov, P.V., Architectures for building secure vehicular networks based on SDN technology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 907–914.CrossRef
9.
Zurück zum Zitat NS-3. http://www.nsnam.org/. NS-3. http://​www.​nsnam.​org/​.​
10.
Zurück zum Zitat Karmanov, M.L., Routing protocol for ad hoc networks, Vestn. Yuzhno-Ural. Gos. Univ., Ser.: Komp’yut. Tekhnol. Upr. Radioelektron., 2009, no. 10, pp. 47–51. Karmanov, M.L., Routing protocol for ad hoc networks, Vestn. Yuzhno-Ural. Gos. Univ., Ser.: Komp’yut. Tekhnol. Upr. Radioelektron., 2009, no. 10, pp. 47–51.
11.
Zurück zum Zitat Keras. https://keras.io/. Keras. https://​keras.​io/​.​
12.
Zurück zum Zitat Tensorflow. https://www.tensorflow.org/. Tensorflow. https://​www.​tensorflow.​org/​.​
13.
Zurück zum Zitat Deeplearning4j. https://deeplearning4j.org/. Deeplearning4j. https://​deeplearning4j.​org/​.​
14.
Zurück zum Zitat Theano. http://www.deeplearning.net/software/theano/. Theano. http://​www.​deeplearning.​net/​software/​theano/​.​
Metadaten
Titel
Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks
verfasst von
V. M. Krundyshev
Publikationsdatum
01.12.2019
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2019
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S014641161908011X

Weitere Artikel der Ausgabe 8/2019

Automatic Control and Computer Sciences 8/2019 Zur Ausgabe