Fig 5 - available via license: CC BY
Content may be subject to copyright.
Anomaly detection process. 

Anomaly detection process. 

Source publication
Full-text available
With the arrival of Industry 4.0, more and more industrial control systems are connected with the outside world, which brings tremendous convenience to industrial production and control, and also introduces many potential security hazards. After a large number of attack cases analysis, we found that attacks in SCADA systems can be divided into inte...

Context in source publication

Context 1
... based on historical data, three baseline information can be verified against each other horizontally and vertically, so as to ensure the authenticity and accuracy of alarms generated, and to reduce the proportion of false alarms and false negatives. The whole anomaly detection process is shown below in Figure 5. ...


Artificial intelligence is making significant changes in industrial internet of things (IIoT). Particularly, machine and deep learning architectures are now used for cybersecurity in smart factories, smart homes, and smart cities. Using advanced mathematical models and algorithms more intelligent protection strategies should be developed. Hacking of IP surveillance camera systems and Closed-Circuit TV (CCTV) vulnerabilities represent typical example where cyber attacks can make severe damage to physical and other Industrial Control Systems (ICS). This chapter analyzes the possibilities to provide better protection of video surveillance systems and communication networks. The authors review solutions related to migrating machine learning based inference towards edge and smart client devices, as well as methods for DDoS (Distributed Denial of Service) intelligent detection, where DDoS attack is recognized as one of the primary concerns in cybersecurity.