Cyber Attack Detection Process in Sensor of DC Micro-Grids Under Electric Vehicle based on Hilbert-Huang Transform and Deep Learning

2020 ◽  
pp. 1-1
Author(s):  
Hao Cui ◽  
Xiaorui Dong ◽  
Hongyan Deng ◽  
Moslem Dehghani ◽  
Khalid Alsubhi ◽  
...  
IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 185938-185949
Author(s):  
T. Gopalakrishnan ◽  
D. Ruby ◽  
Fadi Al-Turjman ◽  
Deepak Gupta ◽  
Irina V. Pustokhina ◽  
...  

Author(s):  
Yucheng Ding ◽  
Kang Ma ◽  
Tianjiao Pu ◽  
Yingxing Wang ◽  
Ran Li ◽  
...  

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 83965-83973 ◽  
Author(s):  
Abdulrahman Al-Abassi ◽  
Hadis Karimipour ◽  
Ali Dehghantanha ◽  
Reza M. Parizi

IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 29429-29440 ◽  
Author(s):  
Mohammad Ghiasi ◽  
Moslem Dehghani ◽  
Taher Niknam ◽  
Abdollah Kavousi-Fard ◽  
Pierluigi Siano ◽  
...  

2021 ◽  
pp. 33-48
Author(s):  
Osama Maher ◽  
◽  
◽  
Elena Sitnikova

Since the Industrial Internet of Things (IIoT) networks comprise heterogeneous manufacturing and technological devices and services, discovering advanced cyber threats is an arduous and risk-prone process. Cyber-attack detection techniques have been recently emerged to understand the process of obtaining knowledge about cyber threats to collect evidence. These techniques have broadly employed for identifying malicious events of cyber threats to protect organizations’ assets. The main limitation of these systems is that they are not able to discover and interpret new attack activities. This paper proposes a new adversarial deep learning for discovering adversarial attacks in IIoT networks. Evaluation of correlation reduction has been used as a means of feature selection for reducing the impact of data poisoning attacks on the subsequent deep learning techniques. Feed Forward Deep Neural Networks have been developed using across various parameter permutations, at differing rates of data poisoning, to develop a robust deep learning architecture. The results of the proposed technique have been compared with previously developed deep learning models, proving the increased robustness of the new deep learning architectures across the ToN_IoT datasets.


2021 ◽  
Vol 11 (16) ◽  
pp. 7228
Author(s):  
Edward Staddon ◽  
Valeria Loscri ◽  
Nathalie Mitton

With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens themselves has become paramount. To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based on the categorisation method used. This paper presents a glimpse into the area of IoT Critical Infrastructure security as well as an overview and analysis of attack categorisation methodologies in the context of wireless IoT-based Critical Infrastructure applications. We believe this can be a guide to aid further researchers in their choice of adapted categorisation approaches. Indeed, adapting appropriated categorisation leads to a quicker attack detection, identification, and recovery. It is, thus, paramount to have a clear vision of the threat landscapes of a specific system.


Sign in / Sign up

Export Citation Format

Share Document