0% Complete
فارسی
Home
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Detection and Identification of Cyber-Attacks in Cyber-Physical Systems Based on Machine Learning Methods
Authors :
Zohre Nasiri Zarandi
1
1- دانشگاه بینالمللی امام خمینی (ره)
Keywords :
کنترل تابآور ، سیستم های سایبر-فیزیکی، حملات سایبری فریب، شبکه عصبی
Abstract :
Cyber-physical systems(cps) have made significant progress in many dynamic applications. However, cyber-attacks are a major threat to these systems.Some of attacks which called deception attacks, inject incorrect information from sensors or controllers. It should be noted that the data generated in these systems is produced in very large number,with so much variety, and high speed, so it is important to use machine learning algorithms to facilitate the analysis and evaluation of data and to identify hidden patterns. In this research,the CPS is modeled as a network of agents that move in union with each other, and one agent is considered as a leader, and the other agents are commanded by the leader. The proposed method in this study is to use the structure of deep neural networks for the detection phase, which should inform the system of the existence of the attack in the initial moments of the attack. The use of resilient control algorithms in the network to isolate the misbehave agent in the leader-follower mechanism has been investigated. In the presented control method, after the attack detection phase with the use of a deep neural network, the control system uses the reputation algorithm to isolate the misbehave agent.
Papers List
List of archived papers
Design and modeling of a waiter robot
Amin Mohammadnejad - Hami Tourajizadeh
شناسایی وبگاه های دامچینی به کمک شبکه عصبی گسستهساز بردار یادگیر (LVQ)
یگانه ستاری - غلامعلی منتظر
چارچوب پیشبینی خرابی تطبیقی مبتنی بر شبکه عصبی گراف پویا و GRU در سامانههای صنعتی IIoT
رسول اسماعیلی فرد - لیلا رنجبر
AOV-IDS: Arithmetic Optimizer with Voting classifier for Intrusion Detection System
Amir Soltany Mahboob - Mohammad Reza Ostadi Moghaddam - Shima Yousefi
Human Resource Allocation to the Credit Requirement Process, A Process Mining Approach
Omid Mahdi Ebadati - Mohammad Mehrabioun - Shokoofeh Sadat Hosseini
طراحی نرم افزاری مبتنی بر واقعیت افزوده با کاربرد فروش عینک
مینا علیانژاد - نسترن زنجانی - زهرا عسکری نژاد امیری
کنترل کیفیت پیش_بینانه آمیزه_های لاستیکی مدلی یکپارچه بر اساس استاندارد پذیرش متغیرهای ANSI Z1.9 و پایش رئولوژیکی برخط
آکو یاری - فرهاد محمدزاده
Prompt-Based Composed Fashion Image Retrieval via Gated Detail-Enhanced Dual Cross-Attention Difference Modeling
Kosar Keshavarz - Reza Azmi
Effective Classifier for Predicting Churn in Payment Terminals Using RFM model and Deep Neural Network
Dr Mahila Dadfarnia - Ali Alemi Matinpour - Dr Monireh Abdoos
روشی برای تشخیص مرحله پیشرفت آلزایمر در تصاویرFMRI مبتنی بر شبکه های عصبی چگال
فرساد زمانی بروجنی - عباس بهره دار
more
Samin Hamayesh - Version 42.5.2