• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于增强电力系统入侵检测的域间融合:一种证据理论和元启发式方法。

Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach.

作者信息

Sahu Abhijeet, Davis Katherine

机构信息

Electrical Engineering Department, Texas A&M University, College Station, TX 77843, USA.

出版信息

Sensors (Basel). 2022 Mar 9;22(6):2100. doi: 10.3390/s22062100.

DOI:10.3390/s22062100
PMID:35336271
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8950146/
Abstract

False alerts due to misconfigured or compromised intrusion detection systems (IDS) in industrial control system (ICS) networks can lead to severe economic and operational damage. However, research using deep learning to reduce false alerts often requires the physical and cyber sensor data to be trustworthy. Implicit trust is a major problem for artificial intelligence or machine learning (AI/ML) in cyber-physical system (CPS) security, because when these solutions are most urgently needed is also when they are most at risk (e.g., during an attack). To address this, the Inter-Domain Evidence theoretic Approach for Inference (IDEA-I) is proposed that reframes the detection problem as how to make good decisions given uncertainty. Specifically, an evidence theoretic approach leveraging Dempster-Shafer (DS) combination rules and their variants is proposed for reducing false alerts. A multi-hypothesis mass function model is designed that leverages probability scores obtained from supervised-learning classifiers. Using this model, a location-cum-domain-based fusion framework is proposed to evaluate the detector's performance using disjunctive, conjunctive, and cautious conjunctive rules. The approach is demonstrated in a cyber-physical power system testbed, and the classifiers are trained with datasets from Man-In-The-Middle attack emulation in a large-scale synthetic electric grid. For evaluating the performance, we consider plausibility, belief, pignistic, and general Bayesian theorem-based metrics as decision functions. To improve the performance, a multi-objective-based genetic algorithm is proposed for feature selection considering the decision metrics as the fitness function. Finally, we present a software application to evaluate the DS fusion approaches with different parameters and architectures.

摘要

工业控制系统(ICS)网络中由于入侵检测系统(IDS)配置错误或遭到破坏而产生的误报,可能会导致严重的经济和运营损失。然而,利用深度学习来减少误报的研究通常要求物理和网络传感器数据是可信的。在网络物理系统(CPS)安全中,隐式信任是人工智能或机器学习(AI/ML)面临的一个主要问题,因为在最急需这些解决方案的时候,它们也最容易受到威胁(例如,在攻击期间)。为了解决这个问题,提出了域间证据理论推理方法(IDEA-I),该方法将检测问题重新定义为在存在不确定性的情况下如何做出正确决策。具体而言,提出了一种利用Dempster-Shafer(DS)组合规则及其变体的证据理论方法来减少误报。设计了一种多假设质量函数模型,该模型利用从监督学习分类器获得的概率分数。利用这个模型,提出了一个基于位置和域的融合框架,使用析取、合取和谨慎合取规则来评估检测器的性能。该方法在一个网络物理电力系统测试平台上得到了验证,并且使用来自大规模合成电网中中间人攻击仿真的数据集对分类器进行了训练。为了评估性能,我们将似然性、可信度、信度概率和基于一般贝叶斯定理的指标作为决策函数。为了提高性能,提出了一种基于多目标的遗传算法用于特征选择,将决策指标作为适应度函数。最后,我们展示了一个软件应用程序,用于评估具有不同参数和架构的DS融合方法。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/37c2d4177a21/sensors-22-02100-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/5d7de0a551d4/sensors-22-02100-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/5fbb820c6958/sensors-22-02100-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/7a6b72e319f7/sensors-22-02100-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/db541307464f/sensors-22-02100-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/ad2096fc536e/sensors-22-02100-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/d239299c023c/sensors-22-02100-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/f554118cd167/sensors-22-02100-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/ce1da90304e9/sensors-22-02100-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/f0949e0ce821/sensors-22-02100-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/37c2d4177a21/sensors-22-02100-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/5d7de0a551d4/sensors-22-02100-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/5fbb820c6958/sensors-22-02100-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/7a6b72e319f7/sensors-22-02100-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/db541307464f/sensors-22-02100-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/ad2096fc536e/sensors-22-02100-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/d239299c023c/sensors-22-02100-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/f554118cd167/sensors-22-02100-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/ce1da90304e9/sensors-22-02100-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/f0949e0ce821/sensors-22-02100-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/db17/8950146/37c2d4177a21/sensors-22-02100-g010.jpg

相似文献

1
Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach.用于增强电力系统入侵检测的域间融合:一种证据理论和元启发式方法。
Sensors (Basel). 2022 Mar 9;22(6):2100. doi: 10.3390/s22062100.
2
Sine-Cosine-Adopted African Vultures Optimization with Ensemble Autoencoder-Based Intrusion Detection for Cybersecurity in CPS Environment.基于正弦余弦自适应非洲秃鹫优化与集成自动编码器的 CPS 环境中网络安全入侵检测
Sensors (Basel). 2023 May 16;23(10):4804. doi: 10.3390/s23104804.
3
A Hybrid Framework for Intrusion Detection in Healthcare Systems Using Deep Learning.基于深度学习的医疗系统入侵检测混合框架。
Front Public Health. 2022 Jan 12;9:824898. doi: 10.3389/fpubh.2021.824898. eCollection 2021.
4
An intelligent dynamic cyber physical system threat detection system for ensuring secured communication in 6G autonomous vehicle networks.一种用于确保6G自动驾驶汽车网络中安全通信的智能动态信息物理系统威胁检测系统。
Sci Rep. 2024 Sep 5;14(1):20795. doi: 10.1038/s41598-024-70835-3.
5
Frequency-Based Representation of Massive Alerts and Combination of Indicators by Heterogeneous Intrusion Detection Systems for Anomaly Detection.基于频率的海量警报表示和异构入侵检测系统的指标组合用于异常检测。
Sensors (Basel). 2022 Jun 10;22(12):4417. doi: 10.3390/s22124417.
6
Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment.基于人工智能的优化与深度学习模型在 CPS 环境中用于区块链的入侵检测
Sci Rep. 2022 Jul 28;12(1):12937. doi: 10.1038/s41598-022-17043-z.
7
ML-DSTnet: A Novel Hybrid Model for Breast Cancer Diagnosis Improvement Based on Image Processing Using Machine Learning and Dempster-Shafer Theory.ML-DSTnet:一种基于机器学习和证据理论的图像处理的新型混合模型,用于改善乳腺癌诊断。
Comput Intell Neurosci. 2023 Nov 2;2023:7510419. doi: 10.1155/2023/7510419. eCollection 2023.
8
Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method.基于集成树和 SHAP 方法的入侵检测系统分类与解释。
Sensors (Basel). 2022 Feb 3;22(3):1154. doi: 10.3390/s22031154.
9
Artificial intelligence enabled intrusion detection systems for cognitive cyber-physical systems in industry 4.0 environment.适用于工业4.0环境中认知网络物理系统的人工智能入侵检测系统。
Cogn Neurodyn. 2022 Oct;16(5):1045-1057. doi: 10.1007/s11571-022-09780-8. Epub 2022 Jan 30.
10
Visual tracking with spatio-temporal Dempster-Shafer information fusion.基于时空 Dempster-Shafer 信息融合的视觉跟踪。
IEEE Trans Image Process. 2013 Aug;22(8):3028-40. doi: 10.1109/TIP.2013.2253478. Epub 2013 Mar 20.

引用本文的文献

1
Sensors and Pattern Recognition Methods for Security and Industrial Applications.安全与工业应用中的传感器与模式识别方法。
Sensors (Basel). 2022 Aug 10;22(16):5968. doi: 10.3390/s22165968.