Intrusion Detection System in the Advanced Metering Infrastructure: A Cross-Layer Feature-Fusion CNN-LSTM-Based Approach

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining

Advanced metering infrastructure (AMI) is an imperative component of the smart grid, as it is responsible for collecting, measuring, analyzing energy usage data, and transmitting these data to the data concentrator and then to a central system in the utility side. Therefore, the security of AMI is one of the most demanding issues in the smart grid implementation. In this paper, we propose an in...

متن کامل

Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System

Mobile ad-hoc wireless networks (MANET) are a significant area of research with many applications. MANETs are more vulnerable to malicious attack. Authentication and encryption techniques can be used as the first line of defense for reducing the possibilities of attacks. Alternatively, these approaches have several demerits and designed for a set of well known attacks. This paper proposes a cro...

متن کامل

A Cross Layer Approach for Intrusion Detection in MANETs

In this paper, we propose a cross layer approach to detect the malicious node (Black hole attack) in MANET. In this approach, the malicious node is detected by the collaborative decision made by the network layer, MAC layer and physical layer on the basis of the parameters passed by the physical and the link layer to the network layer using cross layer design, and then the best path is selected...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sensors

سال: 2021

ISSN: 1424-8220

DOI: 10.3390/s21020626