Cyber-attack method and perpetrator prediction using machine learning algorithms [PDF]
Cyber-attacks have become one of the biggest problems of the world. They cause serious financial damages to countries and people every day. The increase in cyber-attacks also brings along cyber-crime.
Abdulkadir Bilen, Ahmet Bedri Özer
doaj +4 more sources
Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression [PDF]
Cyber threats to industrial control systems (ICSs) have increased as information and communications technology (ICT) has been incorporated. In response to these cyber threats, we are implementing a range of security equipment and specialized training ...
Ju Hyeon Lee +3 more
doaj +2 more sources
Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey. [PDF]
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of enterprise networks against cyber-attacks. However, NIDS networks suffer from several limitations, such as generating a high volume of low-quality alerts. Moreover,
Albasheer H +8 more
europepmc +2 more sources
Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities. [PDF]
With the increasing digitalization and informatization of distribution network systems, distribution networks have gradually developed into distribution network cyber physical systems (CPS) which are deeply integrated with traditional power systems and ...
Zhou B +5 more
europepmc +2 more sources
A robust intelligent zero-day cyber-attack detection technique. [PDF]
With the introduction of the Internet to the mainstream like e-commerce, online banking, health system and other day-to-day essentials, risk of being exposed to various are increasing exponentially. Zero-day attack(s) targeting unknown vulnerabilities of
Kumar V, Sinha D.
europepmc +2 more sources
Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants [PDF]
With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious ...
Jong Woo Park, Seung Jun Lee
doaj +3 more sources
Controller Cyber-Attack Detection and Isolation. [PDF]
This article deals with the cyber security of industrial control systems. Methods for detecting and isolating process faults and cyber-attacks, consisting of elementary actions named “cybernetic faults” that penetrate the control system and destructively affect its operation, are analysed. FDI fault detection and isolation methods and the assessment of
Sztyber-Betley A +3 more
europepmc +4 more sources
A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection. [PDF]
Currently, expert systems and applied machine learning algorithms are widely used to automate network intrusion detection. In critical infrastructure applications of communication technologies, the interaction among various industrial control systems and
Dutta V, Choraś M, Pawlicki M, Kozik R.
europepmc +2 more sources
The rise of an integrated energy system requires the integration of multiple sources of energy to be embraced and transited over the power grid; that means the information and communication systems of traditional power systems will be extended, and their
Heqin Tong +11 more
doaj +1 more source
Data-Driven Cyber-Attack Detection of Intelligent Attacks in Islanded DC Microgrids
In this letter, a data-driven cyber-attack detection method for islanded dc microgrids is proposed. Data are collected by monitoring the behavior of an intelligent attacker who is able to bypass the conventional cyber-attack detection algorithms and ...
Yihao Wan, T. Dragičević
semanticscholar +1 more source

