Web Based Cyber Attack Detection for Industrial System (PLC) Using Deep Learning

被引:0
作者
Yasir, A. [1 ]
Kathirvelu, Kalaivani [1 ]
Arif, M. K. [1 ]
机构
[1] Vels Inst Sci Technol & Adv Studies, Sch Engn, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
来源
2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024 | 2024年
关键词
Photoplethysmography; Deep learning; CNN; LSTM;
D O I
10.1109/ACCAI61061.2024.10602053
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web apps are frequently targeted by cyberattacks due to their network access and security flaws. Instances of attacks targeting online applications might pose significant risks. The issue of cyber security continues to pose a significant barrier in Industry 5.0 scenarios, since cyber-attacks have the potential to result in severe outcomes such as production disruptions, data breaches, and even physical injuries. In order to tackle this difficulty, this study suggests a novel deep-learning approach for identifying webbased assaults in the context of Industry 5.0. The investigation explores transformer models, which are methods used in deep learning, for their capacity to accurately classify attacks and detect unusual behavior. The results of this research demonstrated the higher performance of the suggested transformer-based system, surpassing earlier methods in terms of accuracy, precision, and recall. Deep learning plays a crucial role in effectively tackling cyber security issues in Industry 5.0 settings.
引用
收藏
页数:4
相关论文
共 7 条
  • [1] Aldhaheri A., 2024, Internet Things CyberPhys. Syst., V4, P110, DOI DOI 10.1016/J.IOTCPS.2023.09.003
  • [2] Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems
    Alkahtani, Hasan
    Aldhyani, Theyazn H. H.
    [J]. ELECTRONICS, 2022, 11 (11)
  • [3] An Efficient Cyber Security and Intrusion Detection System Using CRSR with PXORP-ECC and LTH-CNN
    Alotaibi, Nouf Saeed
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (02): : 2061 - 2078
  • [4] Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
    Chen, Zhiyan
    Liu, Jinxin
    Shen, Yu
    Simsek, Murat
    Kantarci, Burak
    Mouftah, Hussein T.
    Djukic, Petar
    [J]. ACM COMPUTING SURVEYS, 2023, 55 (05)
  • [5] Jananee M., 2023, 2023 INT C INN COMP, DOI [10.1109/icses60034.2023.10465563, DOI 10.1109/ICSES60034.2023.10465563]
  • [6] An LSTM based cross-site scripting attack detection scheme for Cloud Computing environments
    Li, Xiaolong
    Wang, Tingting
    Zhang, Wei
    Niu, Xu
    Zhang, Tingyu
    Zhao, Tengteng
    Wang, Yongji
    Wang, Yufei
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [7] A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems
    Wang, Wu
    Harrou, Fouzi
    Bouyeddou, Benamar
    Senouci, Sidi-Mohammed
    Sun, Ying
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 561 - 578