A privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks (original) (raw)
References
Liang G, Weller SR, Luo F, Zhao J, Dong ZY (2018) Distributed blockchain-based data protection framework for modern power systems against cyber attacks. IEEE Trans Smart Grid 10(3):3162 Article Google Scholar
Cortés J., Dullerud GE, Han S, Le Ny J, Mitra S, Pappas GJ (2016) Differential privacy in control and network systems. In: 2016 IEEE 55th conference on decision and control (CDC). IEEE, pp 4252–4272
Song H, Fink GA, Jeschke S (2017) Security and privacy in Cyber-physical systems. Wiley Online Library, New York Book Google Scholar
Lu R, Zhu H, Liu X, Liu JK, Shao J (2014) Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28(4):46 Article Google Scholar
Keshk M, Sitnikova E, Moustafa N, Hu J, Khalil I (2019) An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems. IEEE Trans Sustain Comput.
Deng R, Xiao G, Lu R, Liang H, Vasilakos AV (2016) False data injection on state estimation in power systems—attacks, impacts, and defense: A survey. IEEE Trans Ind Inform 13(2):411 Article Google Scholar
Keshk M, Moustafa N, Sitnikova E, Creech G (2017) Privacy preservation intrusion detection technique for scada systems. In: 2017 Military communications and information systems conference (MilCIS). IEEE, pp 1–6
Liu X, Li Z, Li Z (2015) Impacts of bad data on the pmu based line outage detection. arXiv:1502.04236
Moustafa N, Slay J (2015) Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military communications and information systems conference (MilCIS). IEEE, pp 1–6
Moustafa N, Hu J, Slay J (2019) A holistic review of network anomaly detection systems: A comprehensive survey. J Netw Comput Appl 128:33 Article Google Scholar
Moustafa N, Slay J, Creech G (2017) Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Trans Big Data 5(4):481–494 Article Google Scholar
Aggarwal CC, Philip SY (2008) A general survey of privacy-preserving data mining models and algorithms. In: Privacy-preserving data mining. Springer, pp 11–52
Fahad A, Tari Z, Almalawi A, Goscinski A, Khalil I, Mahmood A (2014) Ppfscada: Privacy preserving framework for scada data publishing. Futur Gener Comput Syst 37:496 Article Google Scholar
Dua S, Du X (2016) Data mining and machine learning in cybersecurity. CRC press, Boca Raton Book Google Scholar
Khan IA, Pi D, Khan ZU, Hussain Y, Nawaz A (2019) Hml-ids: A hybrid-multilevel anomaly prediction approach for intrusion detection in scada systems. IEEE Access 7:89507 Article Google Scholar
Khan IA, Pi D, Yue P, Li B, Khan ZU, Hussain Y, Nawaz A (2019) Efficient behaviour specification and bidirectional gated recurrent units-based intrusion detection method for industrial control systems. Electron Lett 56(1):27 Article Google Scholar
Gai K, Wu Y, Zhu L, Qiu M, Shen M (2019) Privacy-preserving energy trading using consortium blockchain in smart grid. IEEE Trans Ind Inform 5(6):3548–3558 Article Google Scholar
Mohebali B, Tahmassebi A, Meyer-Baese A, Gandomi AH (2020) Probabilistic neural networks: a brief overview of theory, implementation, and application. In: Handbook of probabilistic models. Elsevier, pp 347–367
Zeinali Y, Story BA (2017) Competitive probabilistic neural network. Integr Comput Aided Eng 24(2):105 Article Google Scholar
Lu J, Wong RK (2019) Insider threat detection with long short-term memory. In: Proceedings of the australasian computer science week multiconference. ACM, p 1
Adesuyi TA, Kim BM (2019) A layer-wise perturbation based privacy preserving deep neural networks. In: 2019 International conference on artificial intelligence in information and communication (ICAIIC). IEEE, pp 389–394
Han W, Xue J, Wang Y, Liu Z, Kong Z (2019) Malinsight: A systematic profiling based malware detection framework. J Netw Comput Appl 125:236 Article Google Scholar
Gope P, Sikdar B (2019) An efficient privacy-preserving authentication scheme for energy internet-based vehicle-to-grid communication. IEEE Trans Smart Grid 10(6): 6607–6618 Article Google Scholar
Shen M, Tang X, Zhu L, Du X, Guizani M (2019) Privacy-preserving support vector machine training over blockchain-based encrypted iot data in smart cities. IEEE Internet Things J 6(5):7702–7712 Article Google Scholar
Xie X, Wang B, Wan T, Tang W (2020) Multivariate abnormal detection for industrial control systems using 1d cnn and gru. IEEE Access 8:88348 Article Google Scholar
Yang K, Li Q, Lin X, Chen X, Sun L (2020) ifinger: Intrusion detection in industrial control systems via register-based fingerprinting. IEEE J Sel Areas Commun 38(5):955 Article Google Scholar
Al-Abassi A, Karimipour H, Dehghantanha A, Parizi RM (2020) An ensemble deep learning-based cyber-attack detection in industrial control system. IEEE Access 8:83965 Article Google Scholar
Hu Y, Li H, Luan TH, Yang A, Sun L, Wang Z, Wang R (2020) Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. Futur Gener Comput Syst 108:1230 Article Google Scholar
Krithivasan P. S K, P S S. Sriram V S (2020) Detection of cyberattacks in industrial control systems using enhanced principal component analysis and hypergraph based convolution neural network (epca-hg-cnn). IEEE Trans Ind Appl 56(4):4394–4404 Article Google Scholar
Xu M, Li X, Wang Y, Luo B, Guo J (2020) Privacy-preserving multisource transfer learning in intrusion detection system. Trans Emerg Telecommun Technol, pp e3957
Alkadi O, Moustafa N, Turnbull B, Choo KKR (2020) A deep blockchain framework-enabled collaborative intrusion detection for protecting iot and cloud networks. IEEE Internet Things J
Tian Q, Han D, Li KC, Liu X, Duan L, Castiglione A (2020) An intrusion detection approach based on improved deep belief network. Appl Intell 50:3162–3178 Article Google Scholar
Kaja N, Shaout A, Ma D (2019) An intelligent intrusion detection system. Appl Intell 49 (9):3235 Article Google Scholar
Çavuşoğlu Ü (2019) A new hybrid approach for intrusion detection using machine learning methods. Appl Intell 49(7):2735 Article Google Scholar
Kirda E, Kruegel C, Banks G, Vigna G, Kemmerer R (2006) Behavior-based spyware detection. In: Usenix security symposium, p 694
Inoue D, Yoshioka K, Eto M, Hoshizawa Y, Nakao K (2009) Automated malware analysis system and its sandbox for revealing malware’s internal and external activities. IEICE Trans Inf Syst 92(5):945 Article Google Scholar
Moustafa N, Slay J (2016) The evaluation of network anomaly detection systems: Statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Inf Secur J Glob Perspect 25(1-3):18 Article Google Scholar
Eberhart R, Kennedy J (1995) A new optimizer using particle swarm theory. In: Proceedings of the sixth international symposium on micro machine and human science, MHS’95. IEEE, pp 39–43
Clerc M, Kennedy J (2002) The particle swarm-explosion, stability, and convergence in a multidimensional complex space. IEEE Trans Evol Comput 6(1):58 Article Google Scholar
Eberhart RC, Shi Y, Kennedy J (2001) Swarm intelligence. Elsevier, New York Google Scholar
Parsopoulos K, Vrahatis M (2002) Initializing the particle swarm optimizer using the nonlinear simplex method. Adv Intell Syst Fuzzy Syst Evol Comput 216:1 Google Scholar
Oliveira SR, Zaiane OR (2010) Privacy preserving clustering by data transformation. J Inf Data Manag 1(1):37 Google Scholar
Banu RV, Nagaveni N (2013) Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario. Inform Sci 232:437 Article Google Scholar
Tan Z, Jamdagni A, He X, Nanda P, Liu RP, Hu J (2014) Detection of denial-of-service attacks based on computer vision techniques. IEEE Trans Comput 64(9):2519 ArticleMathSciNet Google Scholar
Hink RCB, Beaver JM, Buckner MA, Morris T, Adhikari U, Pan S (2014) Machine learning for power system disturbance and cyber-attack discrimination. In: 2014 7th International symposium on resilient control systems (ISRCS). IEEE, pp 1–8
McDermott CD, Petrovski A (2017) Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks. International journal of computer networks and communications 9(4)
Ashfaq RAR, Wang XZ, Huang JZ, Abbas H, He YL (2017) Fuzziness based semi-supervised learning approach for intrusion detection system. Inform Sci 378:484 Article Google Scholar
Ambusaidi MA, He X, Nanda P, Tan Z (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput 65(10):2986 ArticleMathSciNet Google Scholar
Petersen R (2015) Data mining for network intrusion detection: A comparison of data mining algorithms and an analysis of relevant features for detecting cyber-attacks, Ph.D. dissertation, Dept. Inf. Commun. Syst., Mid Sweden Univ., Sundsvall, Sweden