Redirigiendo al acceso original de articulo en 21 segundos...
Inicio  /  Information  /  Vol: 13 Par: 12 (2022)  /  Artículo
ARTÍCULO
TITULO

Image-Based Approach to Intrusion Detection in Cyber-Physical Objects

Sergey Golubev    
Evgenia Novikova and Elena Fedorchenko    

Resumen

Recently, approaches based on the transformation of tabular data into images have gained a lot of scientific attention. This is explained by the fact that convolutional neural networks (CNNs) have shown good results in computer vision and other image-based classification tasks. Transformation of features without spatial relations to images allows the application of deep neural networks to a wide range of analysis tasks. This paper analyzes existing approaches to feature transformation based on the conversion of the features of network traffic into images and discusses their advantages and disadvantages. The authors also propose an approach to the transformation of raw network packets into images and analyze its efficiency in the task of network attack detection in a cyber-physical object, including its robustness to novel and unseen attacks.

 Artículos similares

       
 
Jaeeun Lee, Hongseok Choi and Jongnam Kim    
Welding is a crucial manufacturing technique utilized in various industrial sectors, playing a vital role in production and safety aspects, particularly in shear reinforcement of dual-anchorage (SRD) applications, which are aimed at enhancing the strengt... ver más
Revista: Applied Sciences

 
Ioannis Saradopoulos, Ilyas Potamitis, Antonios I. Konstantaras, Panagiotis Eliopoulos, Stavros Ntalampiras and Iraklis Rigakis    
This study describes the development of an image-based insect trap diverging from the plug-in camera insect trap paradigm in that (a) it does not require manual annotation of images to learn how to count targeted pests, and (b) it self-disposes the captu... ver más
Revista: Information

 
Adel Soudani, Manal Alsabhan and Manan Almusallam    
A growing number of services and applications are developed using multimedia sensing low-cost wireless devices, thus creating the Internet of Multimedia Things (IoMT). Nevertheless, energy efficiency and resource availability are two of the most challeng... ver más
Revista: Computers

 
An Cong Tran, Thanh Trinh Thi Kim, Hai Thanh Nguyen     Pág. 100 - 110

 
Betty Saridou, Isidoros Moulas, Stavros Shiaeles and Basil Papadopoulos    
Image conversion of malicious binaries, or binary visualisation, is a relevant approach in the security community. Recently, it has exceeded the role of a single-file malware analysis tool and has become a part of Intrusion Detection Systems (IDSs) thank... ver más
Revista: Applied Sciences