Accesso libero

Guard: A Guided AI System for Intrusion Detection And Automated Response In Critical Infrastructure Environments

, ,  e   
05 lug 2025
INFORMAZIONI SU QUESTO ARTICOLO

Cita
Scarica la copertina

Liao, H. J., Lin, C. H. R., Lin, Y. C., Tung, K. Y. “Intrusion detection system: A comprehensive review”. Journal of Network and Computer Applications. 2013 Jan; 36(1):16–24. Available from: https://www.sciencedirect.com/science/article/pii/S1084804512001944. Search in Google Scholar

Markevych, M., Dawson, M. “A Review of Enhancing Intrusion Detection Systems for Cybersecurity Using Artificial Intelligence (AI)”. International Conference KNOWLEDGE-BASED ORGANIZATION. Sibiu: Vol. XXIX, No. 2023. DOI: 10.2478/kbo-2023-0000. Search in Google Scholar

Dawson, M., Bacius, R., Gouveia, L. B., & Vassilakos, A. “Understanding the challenge of cybersecurity in critical infrastructure sectors”. Land Forces Academy Review. March, 2021; 26(1): 69–75. https://sciendo.com/article/10.2478/raft-2021-0011. Search in Google Scholar

Kumar, G., Kumar, K., & Sachdeva, M. (2010). “The use of artificial intelligence based techniques for intrusion detection: a review”. Artificial Intelligence Review. December, 2010; 34(4), 369–387. https://link.springer.com/article/10.1007/s10462-010-9179-5. Search in Google Scholar

Sommer, R., & Paxson, V. “Outside the Closed World: On Using Machine Learning for Network Intrusion Detection”. In: IEEE Symposium on Security and Privacy. 2010. 305–316. Search in Google Scholar

Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. “Survey of intrusion detection systems: techniques, datasets and challenges”. Cybersecurity. 2019; 2(1), 20. https://cybersecurity.springeropen.com/articles/10.1186/s42400-019-0038-7. Search in Google Scholar

Kim, A., Park, M., & Lee, D. H. “AI-IDS: Application of Deep Learning to Real-Time Web Intrusion Detection”. IEEE Access. 2020; 8, 70245–70261. https://ieeexplore.ieee.org/document/9063416. Search in Google Scholar

Ferrag, M. A., Ndhlovu, M., Tihanyi, N., Cordeiro, L. C., Debbah, M., Lestable, T., & Thandi, N. S. “Revolutionizing cyber threat detection with large language models: A privacy-preserving BERT-based lightweight model for IoT/IIoT devices” [Preprint]. 2024. arXiv. https://arxiv.org/abs/2306.14263. Search in Google Scholar

Seliya, N., Abdollah Zadeh, A., & Khoshgoftaar, T. M. “A literature review on one-class classification and its potential applications in big data”. Journal of Big Data. 2021; 8, Article 122. https://doi.org/10.1186/s40537-021-00514-x. Search in Google Scholar

Sarhan, M., Kulatilleke, G., Lo, W. W., Layeghy, S., & Portmann, M. “DOC-NAD: A hybrid deep one-class classifier for network anomaly detection” [Preprint]. 2022. arXiv. https://arxiv.org/abs/2212.07558. Search in Google Scholar

Seliya, N., Abdollah Zadeh, A., & Khoshgoftaar, T. M. “A literature review on one-class classification and its potential applications in big data”. Journal of Big Data. 2021; 8, Article 122. https://doi.org/10.1186/s40537-021-00514-x. Search in Google Scholar

McCaffrey, J. D. “Anomaly detection for tabular data using a PyTorch transformer with numeric embedding: [Blog post]. April, 20, 2023. https://jamesmccaffrey.wordpress.com/2023/04/20/anomaly-detection-for-tabular-data-using-a-pytorch-transformer-with-numeric-embedding/. Search in Google Scholar

Warburton, D., & Vinberg, S. “The 2021 TLS telemetry report. F5 Labs”. October, 20. 2021. https://www.f5.com/labs/articles/threat-intelligence/the-2021-tls-telemetry-report?utm_source=chatgpt.com. Search in Google Scholar

Daoud, L., & Huen, H. “Performance study of software-based encrypting data at rest”. In: Proceedings of the 37th International Conference on Computers and Their Applications (EPiC Series in Computing, Vol. 82: 122–130). 2022. EasyChair. Retrieved from https://easychair.org/publications/paper/GHB6/open?utm_source=chatg. Search in Google Scholar

Singh, J., Rani, S., & Kumar, V. “Role-based access control (RBAC) enabled secure and efficient data processing framework for IoT networks”. International Journal of Communication Networks and Information Security. 2024. 16(2): 19-32. https://ijcnis.org/. Search in Google Scholar

Menashe, S., Peles, O., Hollander, O., & Yavnieli, U. “Machine learning bug bonanza – exploiting ML clients and “safe” model formats”. JFrog. December, 4, 2024. https://jfrog.com/blog/machine-learning-bug-bonanza-exploiting-ml-clients-and-safe-model-formats/. Search in Google Scholar

Hassan, N. “Secure your machine learning models with these MLSecOps tips”. TechTarget. January 30, 2024. https://www.techtarget.com/searchITOperations/tip/Secure-your-machine-learning-models-with-these-MLSecOps-tips. Search in Google Scholar

Fortra. “2022 SIEM report” (Technical Report). Fortra. 2022. Retrieved from https://static.fortra.com/core-security/pdfs/reports/cs-siem-report-2022.pdf Search in Google Scholar

Jamesdmccaffrey. “Anomaly Detection for Tabular Data Using a PyTorch Transformer with Numeric Embedding”. James D. McCaffrey. May, 8, 2023. https://jamesmccaffrey.wordpress.com/2023/04/20/anomaly-detection-for-tabular-data-using-a-pytorch-transformer-with-numeric-embedding/ Search in Google Scholar

Manujosephv. (n.d.). “GitHub - manujosephv/pytorch_tabular: A standard framework for modelling Deep Learning Models for tabular data.” GitHub. https://github.com/manujosephv/pytorch_tabular Search in Google Scholar