0% Complete
فارسی
Home
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Detection and Identification of Cyber-Attacks in Cyber-Physical Systems Based on Machine Learning Methods
Authors :
Zohre Nasiri Zarandi
1
1- دانشگاه بینالمللی امام خمینی (ره)
Keywords :
کنترل تابآور ، سیستم های سایبر-فیزیکی، حملات سایبری فریب، شبکه عصبی
Abstract :
Cyber-physical systems(cps) have made significant progress in many dynamic applications. However, cyber-attacks are a major threat to these systems.Some of attacks which called deception attacks, inject incorrect information from sensors or controllers. It should be noted that the data generated in these systems is produced in very large number,with so much variety, and high speed, so it is important to use machine learning algorithms to facilitate the analysis and evaluation of data and to identify hidden patterns. In this research,the CPS is modeled as a network of agents that move in union with each other, and one agent is considered as a leader, and the other agents are commanded by the leader. The proposed method in this study is to use the structure of deep neural networks for the detection phase, which should inform the system of the existence of the attack in the initial moments of the attack. The use of resilient control algorithms in the network to isolate the misbehave agent in the leader-follower mechanism has been investigated. In the presented control method, after the attack detection phase with the use of a deep neural network, the control system uses the reputation algorithm to isolate the misbehave agent.
Papers List
List of archived papers
A Neural-based Approach to Aid Early Parkinson's Disease Diagnosis
Dr Armin Salimi-badr - Mohammad Hashemi
Enhancing Employee Promotion Prediction with a Novel Hybrid Model Integrating Convolutional Neural Networks and Random Forest
Pouya Ardehkhani - Seyyed Reza Moslemi - Hanieh Hooshmand
جایگزینی دارو براساس پیشبینی یال روی گرافهای ناهمگون با بهرهگیری از جاسازی گراف ناهمگون
رسول سامانی - فهیمه شاهرخ شهرکی - دکتر ناصر قدیری رسول سامانی - فهیمه شاهرخ شهرکی - ناصر قدیری -
AOV-IDS: Arithmetic Optimizer with Voting classifier for Intrusion Detection System
Amir Soltany Mahboob - Mohammad Reza Ostadi Moghaddam - Shima Yousefi
Fast Duplicate Bug Reports Detector Training using Sampling for Dimension Reduction
Behzad Soleimani Neysiani - Saeed Doostali - Seyed Morteza Babamir - Zahra Aminoroaya
حفظ حریم خصوصی در انتشار نسخه های متوالی دادههای شبکه اجتماعی با امکان افزایش یال
طاهره سرزهی - دکتر مهری رجایی طاهره سرزهی - مهری رجایی -
پیدا کردن خبره در انجمنهای پرسش و پاسخ با استفاده از الگوریتم طبقهبندی ترکیبی
مهراد قاضی پور - علیرضا رضوانیان
Paths-oriented Test Data Generation using Genetic Algorithm
Mohammad Reza Hassanpour Charmchi - Dr Bagher Rahimpour cami
شناسایی حملات فیشینگ با استفاده از الگوریتم عقاب آتشین و شبکه عصبی کانولوشن
علی کوشاری - مهدی فرتاش
A Hybrid Crow Search and Penguin Optimization Algorithm (CPMM) for Efficient Cloud Workflow Scheduling
Reza Akraminejad - Farhad Kazemipour - Mozhdeh Koreh Davoodi
more
Samin Hamayesh - Version 42.3.1