Detection Anomaly of Network Datasets with Honeypots at Industrial Control System
Thedevelopment of ICS 4.0 industry-specific cybersecurity mechanisms can reduce the vulnerability of systems to fire, explosion, human accidents, environmentaldamage, and financial loss. Honeypots are computer systems that are deployed expressly to trick attackers into thinking they are real computers. Given that vulnerabilities are the points of penetration into industrial systems, and using these weaknesses, threats are organized, and intrusion into industrial systems occurs. As a result, to learn about an attacker's behavior, tactics, strategies, and signatures, the EIDS is used to collect information on cyber-attacks, proving it to be a more helpful tool than earlier traditional ways. Attacks collected by honeypot software expose the attackers' source IP addresses as well as the target host that became a victim of the assaults. This paper proposes a novel Honeypot enhanced industrial Early Intrusion Detection System (EIDS) using Machine Learning (ML). The performance of EIDS is evaluated with ML, and the experimental results show that the proposed EIDS detects anomalous behavior of the data with a high detection rate, low false positives, and better classification accuracy.
-
Providing a hybrid method for face detection and gender recognition by a transfer learning and fine-tuning approach in deep convolutional neural networks and the Yolo algorithm
Peyman Jabraelzadeh *, , Mohsen Ebadpour
International Journal Of Nonlinear Analysis And Applications, Jan 2023 -
Honeypot Intrusion Detection System using an Adversarial Reinforcement Learning for Industrial Control Networks
Abbasgholi Pashaei, MohammadEsmaeil Akbari *, Mina Zolfy Lighvan,
Majlesi Journal of Telecommunication Devices, Mar 2023