Inicio > > Redes y comunicaciones informáticas > AUTONOMOUS ANOMALY DETECTION IN SCADA NETWORKS
AUTONOMOUS ANOMALY DETECTION IN SCADA NETWORKS

AUTONOMOUS ANOMALY DETECTION IN SCADA NETWORKS

Chukwunenye Amadi

66,66 €
IVA incluido
Disponible
Editorial:
KS OmniScriptum Publishing
Año de edición:
2026
Materia
Redes y comunicaciones informáticas
ISBN:
9786209410246
66,66 €
IVA incluido
Disponible
Añadir a favoritos

This research addresses the growing vulnerability of legacy SCADA networks in critical infrastructure to sophisticated cyber-physical attacks. These systems, often using unsecured protocols like Modbus and DNP3, are ill-protected by traditional, signature-based intrusion detection. This study proposes an autonomous anomaly detection framework leveraging deep learning to identify threats in real-time. By analyzing operational data, models such as the LSTM-Autoencoder learn normal behavioral patterns and flag deviations with high accuracy. The developed system demonstrates superior performance in detecting stealthy attacks like false data injection and command manipulation, significantly reducing detection latency. This data-driven approach provides a proactive security mechanism, enhancing system resilience without costly infrastructure upgrades. It represents a critical shift towards intelligent, adaptive defense for safeguarding essential services against evolving cyber threats, ensuring operational continuity and safety. The framework integrates continuous learning capabilities, enabling it to adapt to new threats and traffic patterns. Experimental evaluation across simulated.

Artículos relacionados

  • Next Generation Search Engines
    Recent technological progress in computer science, Web technologies, and the constantly evolving information available on the Internet has drastically changed the landscape of search and access to information. Current search engines employ advanced techniques involving machine learning, social networks, and semantic analysis. Next Generation Search Engines: Advanced Models for ...
  • Collaboration and the Semantic Web
    Collaborative working has been increasingly viewed as a good practice for organizations to achieve efficiency. Organizations that work well in collaboration may have access to new sources of funding, deliver new, improved, and more integrated services, make savings on shared costs, and exchange knowledge, information and expertise. Collaboration and the Semantic Web: Social Net...
  • Resource Allocation in Next-Generation Broadband Wireless Access Networks
    With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research o...
  • Advanced Topics in Information Technology Standards and Standardization Research, Volume 1
    Kai Jakobs
    ...
  • Data Warehouses and OLAP
    ...
  • Selected Readings on Database Technologies and Applications
    Terry Halpin
    Education and research in the field of database technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Database Technologies and Applications supplements course instruction and student research with quality chapters focused on key issues concerning the development, design, and analysis ...

Otros libros del autor

  • De l’audit de conformité au contrôle continu
    Chukwunenye Amadi
    Cette étude examine le changement de paradigme passant d’une conformité en cybersécurité périodique et basée sur l’audit à un contrôle continu activé par l’IA au sein des environnements d’infrastructures critiques (CI). Alors que les systèmes de CI sont confrontés à des menaces croissantes, les modèles de conformité traditionnels s’avèrent inadéquats pour assurer une sécurité e...
    Disponible

    66,73 €

  • Détection autonome d’anomalies dans les réseaux SCADA
    Chukwunenye Amadi
    Cette recherche traite de la vulnérabilité croissante des réseaux SCADA hérités dans les infrastructures critiques face à des attaques cyber-physiques sophistiquées. Ces systèmes, utilisant souvent des protocoles non sécurisés comme Modbus et DNP3, sont mal protégés par la détection d’intrusion traditionnelle basée sur les signatures. Cette étude propose un cadre de détection a...
    Disponible

    66,79 €

  • Accélérer la défense nationale
    Chukwunenye Amadi
    Cette étude de recherche examine le rôle pivot des grands modèles de langage (LLM) et du traitement du langage naturel (NLP) dans la transformation des opérations de renseignement de la défense nationale face à la surcharge d’informations. Dans le paysage contemporain de la sécurité numérique, les agences de défense sont inondées de vastes volumes de données de menaces non stru...
    Disponible

    66,79 €

  • Vom Compliance-Audit zur kontinuierlichen Kontrolle
    Chukwunenye Amadi
    Diese Studie untersucht den Paradigmenwechsel von einer periodischen, auditbasierten Cybersecurity-Compliance hin zu einer KI-gestützten kontinuierlichen Kontrolle in Umgebungen kritischer Infrastrukturen (CI). Da CI-Systeme zunehmenden Bedrohungen ausgesetzt sind, erweisen sich traditionelle Compliance-Modelle als unzureichend für die Gewährleistung der Sicherheit in Echtzeit....
    Disponible

    66,73 €

  • Dall’audit di conformità al controllo continuo
    Chukwunenye Amadi
    Questo studio esamina il cambio di paradigma dalla conformità alla cybersicurezza periodica, basata su audit, al controllo continuo abilitato dall’IA all’interno degli ambienti delle Infrastrutture Critiche (CI). Poiché i sistemi di CI affrontano minacce crescenti, i modelli di conformità tradizionali si dimostrano inadeguati per garantire la sicurezza in tempo reale. La ricerc...
    Disponible

    66,73 €

  • Od audytu zgodności do ciągłej kontroli
    Chukwunenye Amadi
    Niniejsze badanie analizuje zmianę paradygmatu z okresowej, opartej na audytach zgodności w zakresie cyberbezpieczeństwa na ciągłą kontrolę wspieraną przez AI w środowiskach infrastruktury krytycznej (CI). Ponieważ systemy CI mierzą się z narastającymi zagrożeniami, tradycyjne modele zgodności okazują się niewystarczające do zapewnienia bezpieczeństwa w czasie rzeczywistym. Bad...
    Disponible

    66,73 €