Detecting Vulnerabilities in Critical Infrastructures by Classifying Exposed Industrial Control Systems Using Deep Learning
نویسندگان
چکیده
Industrial control systems depend heavily on security and monitoring protocols. Several tools are available for this purpose, which scout vulnerabilities take screenshots of various panels later analysis. However, they do not adequately classify images into specific groups, is crucial security-based tasks performed by manual operators. To solve problem, we propose a pipeline based deep learning to snapshots industrial three categories: internet technologies, operation others. More specifically, compare the use transfer fine-tuning in convolutional neural networks (CNNs) pre-trained ImageNet select best CNN architecture classifying systems. We critical infrastructure dataset (CRINF-300), first publicly information technology (IT)/operational (OT) snapshot dataset, with 337 manually labeled images. used CRINF-300 train evaluate eighteen different pipelines, registering their performance under CPU GPU environments. found out that Inception-ResNet-V2 VGG16 architectures obtained results fine-tuning, F1-scores 0.9832 0.9373, respectively. In where time available, recommend using MobileNet-V1 architecture, an average 0.03 s process image F1-score 0.9758.
منابع مشابه
Detecting Overlapping Communities in Social Networks using Deep Learning
In network analysis, a community is typically considered of as a group of nodes with a great density of edges among themselves and a low density of edges relative to other network parts. Detecting a community structure is important in any network analysis task, especially for revealing patterns between specified nodes. There is a variety of approaches presented in the literature for overlapping...
متن کاملAnalyzing Vulnerabilities Of Critical Infrastructures Using Flows And Critical Vertices In And/Or Graphs
AND/OR graphs and minimum-cost solution graphs have been studied extensively in artificial intelligence (see, e.g., Nilsson [14]). Generally, the AND/OR graphs are used to model problem solving processes. The minimum-cost solution graph can be used to attack the problem with the least resource. However, in many cases we want to solve the problem within the shortest time period and we assume tha...
متن کاملNetwork Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures
This report documents the program and the outcomes of Dagstuhl Seminar 14292 “Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures”. The main objective of the seminar was to discuss new approaches and ideas for securing industrial control systems. It is the sequel of several previous Dagstuhl seminars: (1) the series “Network Attack Detection an...
متن کاملNetwork Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)
متن کامل
Vulnerabilities and Attacks Targeting Social Networks and Industrial Control Systems
Vulnerability is a weakness, shortcoming or flaw in the system or network infrastructure which can be used by an attacker to harm the system, disrupt its normal operation and use it for his financial, competitive or other motives or just for cyber escapades. In this paper, we re-examined the various types of attacks on industrial control systems as well as on social networking users. We have li...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2021
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app11010367