Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection Systems.
Dimitrios Christos AsimopoulosPanagiotis I. Radoglou-GrammatikisIoannis MakrisValeri M. MladenovKonstantinos E. PsannisSotirios K. GoudosPanagiotis G. SarigiannidisPublished in: ARES (2023)
Keyphrases
- intrusion detection system
- intrusion detection
- network security
- network intrusion detection systems
- attack detection
- network attacks
- network intrusions
- intrusion prevention
- misuse detection
- network intrusion
- denial of service attacks
- computer security
- smart grid
- network traffic data
- attack scenarios
- normal behavior
- anomaly detection
- network intrusion detection
- network traffic
- cyber attacks
- computer networks
- dos attacks
- malicious activities
- information security
- normal traffic
- alert correlation
- cyber security
- security measures
- control system
- machine learning
- data mining techniques
- distributed intrusion detection
- security architecture
- countermeasures
- privacy concerns
- distributed systems
- data mining
- security threats
- security policies
- communication networks
- real world