Vis enkel innførsel

dc.contributor.authorDiaba, Sayawu Yakubu
dc.contributor.authorAnafo, Theophilus
dc.contributor.authorTetteh, Lord Anertei
dc.contributor.authorOyibo, Michael Alewo
dc.contributor.authorAlola, Andrew Adewale
dc.contributor.authorShafie-khah, Miadreza
dc.contributor.authorElmusrati, Mohammed
dc.date.accessioned2023-09-19T11:40:04Z
dc.date.available2023-09-19T11:40:04Z
dc.date.created2023-06-30T11:29:28Z
dc.date.issued2023
dc.identifier.citationNeural Networks. 2023, 165 321-332.en_US
dc.identifier.issn0893-6080
dc.identifier.urihttps://hdl.handle.net/11250/3090426
dc.description.abstractSupervisory Control and Data Acquisition (SCADA) systems are computer-based control architectures specifically engineered for the operation of industrial machinery via hardware and software models.These systems are used to project, monitor, and automate the state of the operational network through the utilization of ethernet links, which enable two-way communications. However, as a result of their constant connectivity to the internet and the lack of security frameworks within their internal architecture, they are susceptible to cyber-attacks. In light of this, we have proposed an intrusion detection algorithm, intending to alleviate this security bottleneck. The proposed algorithm, the Genetically Seeded Flora (GSF) feature optimization algorithm, is integrated with Transformer Neural Network (TNN) and functions by detecting changes in operational patterns that may be indicative of an intruder’s involvement. The proposed Genetically Seeded Flora Transformer Neural Network (GSFTNN) algorithm stands in stark contrast to the signature-based method employed by traditional intrusion detection systems. To evaluate the performance of the proposed algorithm, extensive experiments are conducted using the WUSTL-IIOT-2018 ICS SCADA cyber security dataset. The results of these experiments indicate that the proposed algorithm outperforms traditional algorithms such as Residual Neural Networks (ResNet), Recurrent Neural Networks (RNN), and Long Short-Term Memory (LSTM) in terms of accuracy and efficiency.en_US
dc.language.isoengen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.subjectgenetically seeded floraen_US
dc.subjectintrusion detection systemsen_US
dc.subjectlong short-term memoryen_US
dc.subjectrecurrent neural networken_US
dc.subjectresidual neural network and transformer neural networken_US
dc.titleSCADA securing system using deep learning to prevent cyber infiltrationen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.rights.holder© 2023 The Author(s). Published by Elsevier Ltd.en_US
dc.source.pagenumber321-332en_US
dc.source.volume165en_US
dc.source.journalNeural Networksen_US
dc.identifier.doi10.1016/j.neunet.2023.05.047
dc.identifier.cristin2159801
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode2


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal