0% Complete
فارسی
Home
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Detection and Identification of Cyber-Attacks in Cyber-Physical Systems Based on Machine Learning Methods
Authors :
Zohre Nasiri Zarandi
1
1- دانشگاه بینالمللی امام خمینی (ره)
Keywords :
کنترل تابآور ، سیستم های سایبر-فیزیکی، حملات سایبری فریب، شبکه عصبی
Abstract :
Cyber-physical systems(cps) have made significant progress in many dynamic applications. However, cyber-attacks are a major threat to these systems.Some of attacks which called deception attacks, inject incorrect information from sensors or controllers. It should be noted that the data generated in these systems is produced in very large number,with so much variety, and high speed, so it is important to use machine learning algorithms to facilitate the analysis and evaluation of data and to identify hidden patterns. In this research,the CPS is modeled as a network of agents that move in union with each other, and one agent is considered as a leader, and the other agents are commanded by the leader. The proposed method in this study is to use the structure of deep neural networks for the detection phase, which should inform the system of the existence of the attack in the initial moments of the attack. The use of resilient control algorithms in the network to isolate the misbehave agent in the leader-follower mechanism has been investigated. In the presented control method, after the attack detection phase with the use of a deep neural network, the control system uses the reputation algorithm to isolate the misbehave agent.
Papers List
List of archived papers
کنترل کیفیت غیرمتمرکز مبتنی بر هوش ترکیبی در سیستمهای مشارکتی برخط
مهدیه طالب زاده - هاله امین طوسی - محمد اله بخش
Blockchain-based Secure UAV-assisted Battlefield Operation underlying 5G
Dhruvi Pancholi - Nilesh Kumar Jadav - Sudeep Tanwar - Deepak Garg - S. Mohammadali Zanjani
GanjNet: Leveraging Network Modeling with Large Language Models for Persian Word Sense Induction
Amir Mohammad Kouyeshpour - Hadi Veisi - Saman Haratizadeh
A No-Code Platform for Developing Customizable Recommender Systems for Restaurants
Moein-Aldin AliHosseini - MohammadReza Sharbaf
تحویل بهینه جریان پخش زنده HTTP: یک رویکرد ترکیبی سرور- شبکه
فائزه امینی تهرانی - احمدرضا منتظرالقائم
خوشه بندی ویسیلاب های دو آوایی زبان فارسی در کاربرد لب خوانی
مهسا هدایتی پور - دکتر یاسر شکفته - دکتر محسن ابراهیمی مقدم
کشف برخط تقلب پیشنهاد ساختگی (Bid-Shielding) در مناقصه و مزایدههای الکترونیکی هلندی با رویکرد تحلیل شبکه اجتماعی
فاطمه الثلایا - دکتر سید علیرضا هاشمی گلپایگانی فاطمه الثلایا - سید علیرضا هاشمی گلپایگانی -
AI-based Secure Intrusion Detection Framework for Digital Twin-enabled Critical Infrastructure
Tanisha Patel - Nilesh Kumar Jadav - Tejal Rathod - Sudeep Tanwar - Deepak Garg - Hossein Shahinzadeh
A novel approach audio watermarking based on (GBT,DCT,SVD)
Mahdi Mosleh
An integrated approach for estimating software cost estimation using Adaptive Neuro-Fuzzy Inference System and the Grey Wolf Optimization algorithm
Maryam Karimi - Taghi Javdani Gandomani - Mahdi Mosleh
Samin Hamayesh - Version 40.3.1