An Intrusion Detection Method for Industrial Control System against Stealthy Attack.
Qi AoPublished in: DSA (2020)
Keyphrases
- detection method
- control system
- malicious users
- alert correlation
- network intrusion
- intrusion detection
- denial of service attacks
- attack scenarios
- face detection
- intrusion detection system
- detection algorithm
- network intrusions
- feature detection
- network security
- control strategy
- critical infrastructure
- closed loop
- fuzzy logic
- attack detection
- anomaly detection
- dos attacks
- misuse detection
- real time
- computer vision
- attack graph
- ddos attacks
- saliency detection
- network traffic
- preprocessing
- image processing
- random forest