BROWSE

Related Scientist

adhitama,bayu's photo.

adhitama,bayu
데이터사이언스그룹
more info

ITEM VIEW & DOWNLOAD

A Systematic Mapping Study and Empirical Comparison of Data-Driven Intrusion Detection Techniques in Industrial Control Networks

DC Field Value Language
dc.contributor.authorBayu Adhi Tama-
dc.contributor.authorLee, Soo Young-
dc.contributor.authorLee, Seungchul-
dc.date.accessioned2023-01-27T00:37:48Z-
dc.date.available2023-01-27T00:37:48Z-
dc.date.created2022-06-30-
dc.date.issued2022-11-
dc.identifier.issn1134-3060-
dc.identifier.urihttps://pr.ibs.re.kr/handle/8788114/12817-
dc.description.abstractA rising communication between modern industrial control infrastructure and the external Internet worldwide has led to a critical need to secure the network from multifarious cyberattacks. An intrusion detection system (IDS) is a preventive mechanism where new sorts of hazardous threats and malicious activities could be detected before harming the industrial process's critical infrastructure. This study reviews the cutting-edge technology of artificial intelligence in developing IDS in industrial control networks by carrying out a systematic mapping study. We included 74 foremost publications from the current literature. These chosen publications were grouped following the types of learning tasks, i.e., supervised, unsupervised, and semi-supervised. This review article helps researchers understand the present status of artificial intelligence techniques applied to IDS in industrial control networks. Other mapping categories were also covered, including year published, publication venues, dataset considered, and IDS approaches. This study reports an empirical assessment of several classification algorithms such as random forest, gradient boosting machine, extreme gradient boosting machine, deep neural network, and stacked generalization ensemble. Statistical significance tests were also used to assess the classifiers' performance differences in multiple scenarios and datasets. This paper provides a contemporary systematic mapping study and empirical evaluation of IDS approaches in industrial control networks.-
dc.language영어-
dc.publisherSPRINGER-
dc.titleA Systematic Mapping Study and Empirical Comparison of Data-Driven Intrusion Detection Techniques in Industrial Control Networks-
dc.typeArticle-
dc.type.rimsART-
dc.identifier.wosid000802031500001-
dc.identifier.scopusid2-s2.0-85131068175-
dc.identifier.rimsid78426-
dc.contributor.affiliatedAuthorBayu Adhi Tama-
dc.identifier.doi10.1007/s11831-022-09767-y-
dc.identifier.bibliographicCitationARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, v.29, no.7, pp.5353 - 5380-
dc.relation.isPartOfARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING-
dc.citation.titleARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING-
dc.citation.volume29-
dc.citation.number7-
dc.citation.startPage5353-
dc.citation.endPage5380-
dc.type.docTypeReview-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaMathematics-
dc.relation.journalWebOfScienceCategoryComputer Science, Interdisciplinary Applications-
dc.relation.journalWebOfScienceCategoryEngineering, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryMathematics, Interdisciplinary Applications-
dc.subject.keywordPlusANOMALY DETECTION-
dc.subject.keywordPlusINTERNET-
dc.subject.keywordPlusATTACKS-
dc.subject.keywordPlusCLASSIFICATION-
dc.subject.keywordPlusCLASSIFIERS-
dc.subject.keywordPlusTHINGS-
dc.subject.keywordPlusMODEL-
Appears in Collections:
Pioneer Research Center for Mathematical and Computational Sciences(수리 및 계산과학 연구단) > Data Science Group(데이터 사이언스 그룹) > 1. Journal Papers (저널논문)
Files in This Item:
There are no files associated with this item.

qrcode

  • facebook

    twitter

  • Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
해당 아이템을 이메일로 공유하기 원하시면 인증을 거치시기 바랍니다.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Browse