应用新皮质模型识别工业物联网网络流量中的上下文异常情况

IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS
G. A. Markov
{"title":"应用新皮质模型识别工业物联网网络流量中的上下文异常情况","authors":"G. A. Markov","doi":"10.3103/S0146411623080163","DOIUrl":null,"url":null,"abstract":"<p>This paper examines the problem of identifying network anomalies when processing data streams in industrial systems. A network anomaly refers to a malicious signature and the current context: network environment and topology, routing parameters, and node characteristics. As a result of the study, it is proposed to use a neocortex model that supports the memory mechanism to detect network anomalies.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1018 - 1024"},"PeriodicalIF":0.6000,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Application of a Neocortex Model to Identify Contextual Anomalies in the Industrial Internet of Things Network Traffic\",\"authors\":\"G. A. Markov\",\"doi\":\"10.3103/S0146411623080163\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>This paper examines the problem of identifying network anomalies when processing data streams in industrial systems. A network anomaly refers to a malicious signature and the current context: network environment and topology, routing parameters, and node characteristics. As a result of the study, it is proposed to use a neocortex model that supports the memory mechanism to detect network anomalies.</p>\",\"PeriodicalId\":46238,\"journal\":{\"name\":\"AUTOMATIC CONTROL AND COMPUTER SCIENCES\",\"volume\":\"57 8\",\"pages\":\"1018 - 1024\"},\"PeriodicalIF\":0.6000,\"publicationDate\":\"2024-02-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"AUTOMATIC CONTROL AND COMPUTER SCIENCES\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://link.springer.com/article/10.3103/S0146411623080163\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","FirstCategoryId":"1085","ListUrlMain":"https://link.springer.com/article/10.3103/S0146411623080163","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

摘要 本文探讨了在处理工业系统数据流时识别网络异常的问题。网络异常指的是恶意签名和当前环境:网络环境和拓扑、路由参数和节点特征。研究结果建议使用支持记忆机制的新皮质模型来检测网络异常。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

Application of a Neocortex Model to Identify Contextual Anomalies in the Industrial Internet of Things Network Traffic

Application of a Neocortex Model to Identify Contextual Anomalies in the Industrial Internet of Things Network Traffic

Application of a Neocortex Model to Identify Contextual Anomalies in the Industrial Internet of Things Network Traffic

This paper examines the problem of identifying network anomalies when processing data streams in industrial systems. A network anomaly refers to a malicious signature and the current context: network environment and topology, routing parameters, and node characteristics. As a result of the study, it is proposed to use a neocortex model that supports the memory mechanism to detect network anomalies.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
AUTOMATIC CONTROL AND COMPUTER SCIENCES
AUTOMATIC CONTROL AND COMPUTER SCIENCES AUTOMATION & CONTROL SYSTEMS-
CiteScore
1.70
自引率
22.20%
发文量
47
期刊介绍: Automatic Control and Computer Sciences is a peer reviewed journal that publishes articles on• Control systems, cyber-physical system, real-time systems, robotics, smart sensors, embedded intelligence • Network information technologies, information security, statistical methods of data processing, distributed artificial intelligence, complex systems modeling, knowledge representation, processing and management • Signal and image processing, machine learning, machine perception, computer vision
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信