Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Improving ICS security through Honeynets and Machine Learning techniques

View through CrossRef
Abstract Abstract The internet of things(IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical Systems (CPS) can be seen everywhere, Home applications, Buildings, Cars, Space Industry, Military, Health Care, and in many other fields. On the other hand, they become an easier target for attackers, due to many reasons including the limitation of hardware, so from that point, companies start working to build a secure systems by keep themselves updated about their system threats and vulnerabilities, and also by studying how the attackers can gets into their system, how they act, what is the attack flow, and also the identity of the attackers by trapping and tricking them into believing that they have got access to the actual system or assets . And that’s what it's called a Honeypot. [1] As the technology keeps changing and becomes more powerful, so do the attackers, and for that reason companies should use new techniques to enhance Honeypots efficacy by making it undetectable by cybercriminals, more usable and make use of the information that the honeypots gather in a more efficient way. Moreover, Machine Learning (ML) techniques are able to provide intelligence to IoT, IIoT, and ICS systems and networks, and enhance its ability to deal with various security problems, hence, in this research, we are developing a new solution that improves the architecture of SCADA (An ICS System) by adding CamouflageNet Honeynet into it and ML techniques, in order to defend and acquisition system security performance.
Title: Improving ICS security through Honeynets and Machine Learning techniques
Description:
Abstract Abstract The internet of things(IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical Systems (CPS) can be seen everywhere, Home applications, Buildings, Cars, Space Industry, Military, Health Care, and in many other fields.
On the other hand, they become an easier target for attackers, due to many reasons including the limitation of hardware, so from that point, companies start working to build a secure systems by keep themselves updated about their system threats and vulnerabilities, and also by studying how the attackers can gets into their system, how they act, what is the attack flow, and also the identity of the attackers by trapping and tricking them into believing that they have got access to the actual system or assets .
And that’s what it's called a Honeypot.
[1] As the technology keeps changing and becomes more powerful, so do the attackers, and for that reason companies should use new techniques to enhance Honeypots efficacy by making it undetectable by cybercriminals, more usable and make use of the information that the honeypots gather in a more efficient way.
Moreover, Machine Learning (ML) techniques are able to provide intelligence to IoT, IIoT, and ICS systems and networks, and enhance its ability to deal with various security problems, hence, in this research, we are developing a new solution that improves the architecture of SCADA (An ICS System) by adding CamouflageNet Honeynet into it and ML techniques, in order to defend and acquisition system security performance.

Related Results

A Comparative Study of Some Selected Classifiers on an Imbalanced Dataset for Sentiment Analysis
A Comparative Study of Some Selected Classifiers on an Imbalanced Dataset for Sentiment Analysis
Extracting subjective data from online user generated text documents is made quite easy with the use of sentiment analysis. For a classification task different individual algorithm...
Intercultural Competence Development Among University Students From a Self-Regulated Learning Perspective
Intercultural Competence Development Among University Students From a Self-Regulated Learning Perspective
Abstract. Intercultural competence is defined as a lifelong learning task that can be developed in any intergroup situation. A self-regulated learning model is applied to better un...
Graphic Design for Children with Learning Disabilities Based on the Isaan Mural Painting
Graphic Design for Children with Learning Disabilities Based on the Isaan Mural Painting
The study of 'Graphic design for children with learning disabilities' is a study that delves into learning-disabled children in the Isaan region. The author used the survey to form...
Neutrosophic Hybrid Machine Learning Algorithm for Diabetes Disease Prediction
Neutrosophic Hybrid Machine Learning Algorithm for Diabetes Disease Prediction
Because of its far-reaching effects, diabetes remains a major health problem on a worldwide scale. It's a metabolic illness that causes hyperglycemia and a host of other health iss...
PENINGKATAN AKTIVITAS DAN HASIL BELAJAR MELALUI METODE JIGSAW
PENINGKATAN AKTIVITAS DAN HASIL BELAJAR MELALUI METODE JIGSAW
This study aimed to determine the effect of the use of jigsaw cooperative learning on the activeness and learning outcomes of Civics learning in class VIII.1 SMP Negeri 2 Sungayang...
Learning with ANIMA
Learning with ANIMA
The paper develops a semi-formal model of learning which modifies the traditional paradigm of artificial neural networks, implementing deep learning by means of a key insight borro...
A Machine Learning approach combining omics data for Alzheimer’s Disease analysis
A Machine Learning approach combining omics data for Alzheimer’s Disease analysis
Alzheimer’s disease (AD) is a complex neurological disorder whose underlying mechanisms remain elusive to this day. Molecular biology methodologies, especially techniques like sing...
Redesigning Assessment for Holistic Learning
Redesigning Assessment for Holistic Learning
This paper discusses the importance of holistic assessment in the teaching and learning process at all levels of education, both in schools and in higher education institutions. Re...

Back to Top