0% Complete
فارسی
Home
/
چهاردهمین کنفرانس بین المللی فناوری اطلاعات و دانش
AI-based Secure Intrusion Detection Framework for Digital Twin-enabled Critical Infrastructure
Authors :
Tanisha Patel
1
Nilesh Kumar Jadav
2
Tejal Rathod
3
Sudeep Tanwar
4
Deepak Garg
5
Hossein Shahinzadeh
6
1- Institute of Technology, Nirma University
2- Institute of Technology, Nirma University
3- Institute of Technology, Nirma University
4- Institute of Technology, Nirma University
5- SR University
6- (Tehran Polytechnic) Amirkabir University of Technology
Keywords :
Critical Infrastructure،PLC،Artificial Intelligence،Digital Twin،Machine Learning
Abstract :
This paper discusses the importance of securing modern society’s critical infrastructure in the face of physical and digital threats. It emphasizes the vulnerabilities introduced by programmable logic controllers (PLCs) and supervisory control and data acquisition (SCADA) systems that highlight the potential of digital twins to enhance security. The paper presents a research contribution aimed at improving the integrity of data exchange among PLCs equipped with digital twins in critical infrastructure systems. It leverages artificial intelligence (AI) algorithms to detect and mitigate different security attacks, such as denial of service (DoS), injection attacks, and data tampering attacks. The proposed framework efficiently classifies the malicious and non-malicious data of digital twin-based critical infrastructure. Further, the trained AI model is deployed on a critical infrastructure’s intrusion detection system that continuously monitors network traffic and system logs in real time, identifying unusual patterns or behaviors that may indicate an intrusion. Further, the performance of the proposed framework is evaluated using accuracy, log loss, and validation curves.
Papers List
List of archived papers
پیش بینی ارتباط میزان مرگ و میر با هم زمانی وجود دو بیماری در مبتلایان به کرونا به کمک بگارگیری شبکه عصبی Word2Vec
سمن مثقالی - دکتر جواد عسکری سمن مثقالی - جواد عسکری -
User Preferences Elicitation in Bilateral Automated Negotiation Using Recursive Least Square Estimation
Farnaz Salmanian - Dr Hamid Jazayeri - Dr Javad Kazemitabar
A method for image steganography based on chaotic maps and advanced compression algorithms
Mohammad Yousefi Sorkhi
Mode Selection and Resource Allocation in D2D-Enabled MC-NOMA using Matching Theory
Alireza Gholamrezaee - Hamid Farrokhi - Javad Zeraatkar Moghaddam
خوشه بندی شبکههای بیسیم ادهاک مبتنی بر محدودیتهای فازی
پروا کلیبری - کریم صمدزمینی
جمعآوری، تحلیل و خلاصه سازی نظرات کاربران فارسی زبان در شبکههای اجتماعی پیرامون بیماری فراگیر کووید-19
محمدرضا شمس - محمد یاسین فخار محمدرضا شمس - محمد یاسین فخار -
استخراج ویژگی مجموعه دادههای پزشکی دارای ابعاد بالا با استفاده از برنامه نویسی ژنتیک چند منظوره
سحر فقیهی راد - دکتر سیده نفیسه آل محمد سحر فقیهی راد - سیده نفیسه آل محمد -
Presentation of a New Decoder Based on Quantum Cellular Automata Technology Along with an Analysis of Energy Consumption
- - -
An Improved Image Classification Based In Feature Extraction From Convolutional Neural Network: Application To Flower Classification
Faeze Sadati - Dr Behrooz Rezaie
Knowledge Extraction from Technical Reports Based on Large Language Models: An Exploratory Study
Parsa Bakhtiari - Hassan Bashiri - Alireza Khalilipour - Masoud Nasiripour - Moharram Challenger
more
Samin Hamayesh - Version 42.0.3