Por favor, use este identificador para citar o enlazar este ítem:
https://hdl.handle.net/11000/30567
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Feijoo, Juan Ramón | - |
dc.contributor.author | Guerrero-Curieses, Alicia | - |
dc.contributor.author | Gimeno Blanes, Francisco Javier | - |
dc.contributor.author | Castro Fernández, Mario Fernando | - |
dc.contributor.author | Rojo-Álvarez, José Luis | - |
dc.contributor.other | Departamentos de la UMH::Ingeniería de Comunicaciones | es_ES |
dc.date.accessioned | 2024-01-23T11:31:31Z | - |
dc.date.available | 2024-01-23T11:31:31Z | - |
dc.date.created | 2023-03-14 | - |
dc.identifier.citation | IEEE Access Volume: 11(2023) | es_ES |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://hdl.handle.net/11000/30567 | - |
dc.description.abstract | High-Power electric grid networks require extreme security in their associated telecommunication network to ensure protection and control throughout power transmission. Accordingly, supervisory control and data acquisition systems form a vital part of any critical infrastructure, and the safety of the associated telecommunication network from intrusion is crucial. Whereas events related to operation and maintenance are often available and carefully documented, only some tools have been proposed to discriminate the information dealing with the heterogeneous data from intrusion detection systems and to support the network engineers. In this work, we present the use of deep learning techniques, such as Autoencoders or conventional Multiple Correspondence Analysis, to analyze and prune the events on power communication networks in terms of categorical data types often used in anomaly and intrusion detection (such as addresses or anomaly description). This analysis allows us to quantify and statistically describe highseverity events. Overall, portions of alerts around 5-10% have been prioritized in the analysis as first to handle by managers. Moreover, probability clouds of alerts have been shown to configure explicit manifolds in latent spaces. These results offer a homogeneous framework for implementing anomaly detection prioritization in power communication networks. | es_ES |
dc.format | application/pdf | es_ES |
dc.format.extent | 17 | es_ES |
dc.language.iso | eng | es_ES |
dc.publisher | Institute of Electrical and Electronics Engineers | es_ES |
dc.rights | info:eu-repo/semantics/openAccess | es_ES |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | Telecommunication security | es_ES |
dc.subject | intrusion detection | es_ES |
dc.subject | deep learning | es_ES |
dc.subject | high power | es_ES |
dc.subject | power communication | es_ES |
dc.subject | latent variables | es_ES |
dc.subject | alert prioritization | es_ES |
dc.subject | alert manifolds | es_ES |
dc.subject.other | CDU::6 - Ciencias aplicadas::62 - Ingeniería. Tecnología | es_ES |
dc.title | Cybersecurity Alert Prioritization in a Critical High Power Grid With Latent Spaces | es_ES |
dc.type | info:eu-repo/semantics/article | es_ES |
dc.relation.publisherversion | https://doi.org/10.1109/ACCESS.2023.3255101 | es_ES |
Ver/Abrir:
230309 Cybersecurity_Alert_Prioritization_in_a_Critical_High_Power_Grid_With_Latent_Spaces.pdf
2,86 MB
Adobe PDF
Compartir:
La licencia se describe como: Atribución-NonComercial-NoDerivada 4.0 Internacional.