{"title":"网络类:工业4.0中网络安全的分类方法","authors":"Salma Laazizi, Jihan Ben Azzouz, A. Jemai","doi":"10.1109/SETIT54465.2022.9875643","DOIUrl":null,"url":null,"abstract":"Cyberinfrastructure is characterized by a large amount of emerging and dynamic information, requiring a large number of cyber-criminals trying to acquire information, data mining, machine learning, measurements, and other interdisciplinary skills to meet the cybersecurity issues in Industry 4.0. Machine learning and information mining play an important role in cybersecurity, and unstable information frequently has a high-dimensional feature space. The presence of several noisy characteristics among high-dimensional features might impede and degrade classifier performance. To address this issue, feature selection and subspace methods have been put out and assessed during the past few years. In this paper, four classification techniques and a feature selection strategy are implemented to detect attacks that threaten Industry 4.0. These techniques are Random Forest (RF), Decision Trees (J48), Support Vector Machines (SVM), and Naive Bayes (NB) with Feature Selection Strategy (CFS). Several experiments have been performed using the train and test NSL-KDD datasets with good results. These are based on four categories: Denial of Service (DoS) attack, Probing Attack, User-to-Root (U2R) attack, and Remote-to-Local (R2L) attack. To improve the detection rate of these attacks, a strategy combining multiple classification algorithms is implemented.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"cybclass: classification approach for cybersecurity in industry 4.0\",\"authors\":\"Salma Laazizi, Jihan Ben Azzouz, A. Jemai\",\"doi\":\"10.1109/SETIT54465.2022.9875643\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyberinfrastructure is characterized by a large amount of emerging and dynamic information, requiring a large number of cyber-criminals trying to acquire information, data mining, machine learning, measurements, and other interdisciplinary skills to meet the cybersecurity issues in Industry 4.0. Machine learning and information mining play an important role in cybersecurity, and unstable information frequently has a high-dimensional feature space. The presence of several noisy characteristics among high-dimensional features might impede and degrade classifier performance. To address this issue, feature selection and subspace methods have been put out and assessed during the past few years. In this paper, four classification techniques and a feature selection strategy are implemented to detect attacks that threaten Industry 4.0. These techniques are Random Forest (RF), Decision Trees (J48), Support Vector Machines (SVM), and Naive Bayes (NB) with Feature Selection Strategy (CFS). Several experiments have been performed using the train and test NSL-KDD datasets with good results. These are based on four categories: Denial of Service (DoS) attack, Probing Attack, User-to-Root (U2R) attack, and Remote-to-Local (R2L) attack. To improve the detection rate of these attacks, a strategy combining multiple classification algorithms is implemented.\",\"PeriodicalId\":126155,\"journal\":{\"name\":\"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SETIT54465.2022.9875643\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SETIT54465.2022.9875643","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
cybclass: classification approach for cybersecurity in industry 4.0
Cyberinfrastructure is characterized by a large amount of emerging and dynamic information, requiring a large number of cyber-criminals trying to acquire information, data mining, machine learning, measurements, and other interdisciplinary skills to meet the cybersecurity issues in Industry 4.0. Machine learning and information mining play an important role in cybersecurity, and unstable information frequently has a high-dimensional feature space. The presence of several noisy characteristics among high-dimensional features might impede and degrade classifier performance. To address this issue, feature selection and subspace methods have been put out and assessed during the past few years. In this paper, four classification techniques and a feature selection strategy are implemented to detect attacks that threaten Industry 4.0. These techniques are Random Forest (RF), Decision Trees (J48), Support Vector Machines (SVM), and Naive Bayes (NB) with Feature Selection Strategy (CFS). Several experiments have been performed using the train and test NSL-KDD datasets with good results. These are based on four categories: Denial of Service (DoS) attack, Probing Attack, User-to-Root (U2R) attack, and Remote-to-Local (R2L) attack. To improve the detection rate of these attacks, a strategy combining multiple classification algorithms is implemented.