A Systematic Mapping Study and Empirical Comparison of Data-Driven Intrusion Detection Techniques in Industrial Control Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bayu Adhi Tama | - |
dc.contributor.author | Lee, Soo Young | - |
dc.contributor.author | Lee, Seungchul | - |
dc.date.accessioned | 2023-01-27T00:37:48Z | - |
dc.date.available | 2023-01-27T00:37:48Z | - |
dc.date.created | 2022-06-30 | - |
dc.date.issued | 2022-11 | - |
dc.identifier.issn | 1134-3060 | - |
dc.identifier.uri | https://pr.ibs.re.kr/handle/8788114/12817 | - |
dc.description.abstract | A rising communication between modern industrial control infrastructure and the external Internet worldwide has led to a critical need to secure the network from multifarious cyberattacks. An intrusion detection system (IDS) is a preventive mechanism where new sorts of hazardous threats and malicious activities could be detected before harming the industrial process's critical infrastructure. This study reviews the cutting-edge technology of artificial intelligence in developing IDS in industrial control networks by carrying out a systematic mapping study. We included 74 foremost publications from the current literature. These chosen publications were grouped following the types of learning tasks, i.e., supervised, unsupervised, and semi-supervised. This review article helps researchers understand the present status of artificial intelligence techniques applied to IDS in industrial control networks. Other mapping categories were also covered, including year published, publication venues, dataset considered, and IDS approaches. This study reports an empirical assessment of several classification algorithms such as random forest, gradient boosting machine, extreme gradient boosting machine, deep neural network, and stacked generalization ensemble. Statistical significance tests were also used to assess the classifiers' performance differences in multiple scenarios and datasets. This paper provides a contemporary systematic mapping study and empirical evaluation of IDS approaches in industrial control networks. | - |
dc.language | 영어 | - |
dc.publisher | SPRINGER | - |
dc.title | A Systematic Mapping Study and Empirical Comparison of Data-Driven Intrusion Detection Techniques in Industrial Control Networks | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.identifier.wosid | 000802031500001 | - |
dc.identifier.scopusid | 2-s2.0-85131068175 | - |
dc.identifier.rimsid | 78426 | - |
dc.contributor.affiliatedAuthor | Bayu Adhi Tama | - |
dc.identifier.doi | 10.1007/s11831-022-09767-y | - |
dc.identifier.bibliographicCitation | ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, v.29, no.7, pp.5353 - 5380 | - |
dc.relation.isPartOf | ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING | - |
dc.citation.title | ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING | - |
dc.citation.volume | 29 | - |
dc.citation.number | 7 | - |
dc.citation.startPage | 5353 | - |
dc.citation.endPage | 5380 | - |
dc.type.docType | Review | - |
dc.description.journalClass | 1 | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Mathematics | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Interdisciplinary Applications | - |
dc.relation.journalWebOfScienceCategory | Engineering, Multidisciplinary | - |
dc.relation.journalWebOfScienceCategory | Mathematics, Interdisciplinary Applications | - |
dc.subject.keywordPlus | ANOMALY DETECTION | - |
dc.subject.keywordPlus | INTERNET | - |
dc.subject.keywordPlus | ATTACKS | - |
dc.subject.keywordPlus | CLASSIFICATION | - |
dc.subject.keywordPlus | CLASSIFIERS | - |
dc.subject.keywordPlus | THINGS | - |
dc.subject.keywordPlus | MODEL | - |