0% Complete
English
صفحه اصلی
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Detection and Identification of Cyber-Attacks in Cyber-Physical Systems Based on Machine Learning Methods
نویسندگان :
Zohre Nasiri Zarandi
1
1- دانشگاه بینالمللی امام خمینی (ره)
کلمات کلیدی :
کنترل تابآور ، سیستم های سایبر-فیزیکی، حملات سایبری فریب، شبکه عصبی
چکیده :
Cyber-physical systems(cps) have made significant progress in many dynamic applications. However, cyber-attacks are a major threat to these systems.Some of attacks which called deception attacks, inject incorrect information from sensors or controllers. It should be noted that the data generated in these systems is produced in very large number,with so much variety, and high speed, so it is important to use machine learning algorithms to facilitate the analysis and evaluation of data and to identify hidden patterns. In this research,the CPS is modeled as a network of agents that move in union with each other, and one agent is considered as a leader, and the other agents are commanded by the leader. The proposed method in this study is to use the structure of deep neural networks for the detection phase, which should inform the system of the existence of the attack in the initial moments of the attack. The use of resilient control algorithms in the network to isolate the misbehave agent in the leader-follower mechanism has been investigated. In the presented control method, after the attack detection phase with the use of a deep neural network, the control system uses the reputation algorithm to isolate the misbehave agent.
لیست مقالات
لیست مقالات بایگانی شده
پیش بینی ارتباط میزان مرگ و میر با هم زمانی وجود دو بیماری در مبتلایان به کرونا به کمک بگارگیری شبکه عصبی Word2Vec
سمن مثقالی - دکتر جواد عسکری سمن مثقالی - جواد عسکری -
Effective Design of Reversible 2×2 Vedic Multiplier With Low Cost
Mojtaba Noorallahzadeh - Mohammad Mosleh - Ali Shahidikia
مکانیابی خطاهای کاربردها و خدمات نرمافزاری با کمک تولید داده آزمون با نامتغیرهای محتمل
محمد نصرتی مقدم - حسن حقیقی - مجتبی وحیدی اصل
Cryptanalysis of two password authenticated key exchange schemes
Mohammad Ali Poorafsahi - Hamid Mala
Design and Simulation of a New Multiplexer with Energy Analysis in Quantum Cellular Automata Technology
- - -
An efficient hybrid approach for performance-based alternative design evaluation in systems engineering
Abbas Chaman Para - Maryam Nooraei Abadeh - Sondos Bahadori
روشی برای تشخیص مرحله پیشرفت آلزایمر در تصاویرFMRI مبتنی بر شبکه های عصبی چگال
فرساد زمانی بروجنی - عباس بهره دار
Stock Market Prediction Using Hard and Soft Data Fusion
Saeed Mohammadi Dashtaki - Masoud Alizadeh - Behzad Moshiri
Predictive Maintenance using LSTM and Adaptive Windowing
Aien Ghanbari Adivi - Behrouz Shahgholi Ghahfarokhi
A qualitative spoofing detection system based on LSTMs for IoMT
Iman Jafarian - Amirmasoud Sepehrian - Siavash Khorsandi
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 41.3.1