{"data":{"id":"10.48550/arxiv.1905.03168","type":"dois","attributes":{"doi":"10.48550/arxiv.1905.03168","prefix":"10.48550","suffix":"arxiv.1905.03168","identifiers":[{"identifier":"1905.03168","identifierType":"arXiv"}],"alternateIdentifiers":[{"alternateIdentifierType":"arXiv","alternateIdentifier":"1905.03168"}],"creators":[{"name":"De Teyou, Gael Kamdem","nameType":"Personal","givenName":"Gael Kamdem","familyName":"De Teyou","affiliation":[],"nameIdentifiers":[]},{"name":"Ziazet, Junior","nameType":"Personal","givenName":"Junior","familyName":"Ziazet","affiliation":[],"nameIdentifiers":[]}],"titles":[{"title":"Convolutional Neural Network for Intrusion Detection System In Cyber Physical Systems"}],"publisher":"arXiv","container":{},"publicationYear":2019,"subjects":[{"lang":"en","subject":"Cryptography and Security (cs.CR)","subjectScheme":"arXiv"},{"lang":"en","subject":"Machine Learning (cs.LG)","subjectScheme":"arXiv"},{"subject":"FOS: Computer and information sciences","subjectScheme":"Fields of Science and Technology (FOS)"},{"subject":"FOS: Computer and information sciences","schemeUri":"http://www.oecd.org/science/inno/38235147.pdf","subjectScheme":"Fields of Science and Technology (FOS)"}],"contributors":[],"dates":[{"date":"2019-05-08T15:53:35Z","dateType":"Submitted","dateInformation":"v1"},{"date":"2019-05-09T00:17:40Z","dateType":"Updated","dateInformation":"v1"},{"date":"2019-06-07T15:32:43Z","dateType":"Withdrawn","dateInformation":"v2; This submission has been withdrawn by arXiv administrators due to inappropriate text reuse from external sources"},{"date":"2019-06-10T00:15:37Z","dateType":"Updated","dateInformation":"v2"},{"date":"2019-05","dateType":"Available","dateInformation":"v1"},{"date":"2019","dateType":"Issued"}],"language":null,"types":{"ris":"GEN","bibtex":"misc","citeproc":"article","schemaOrg":"CreativeWork","resourceType":"Article","resourceTypeGeneral":"Preprint"},"relatedIdentifiers":[],"relatedItems":[],"sizes":[],"formats":[],"version":"2","rightsList":[{"rights":"arXiv.org perpetual, non-exclusive license","rightsUri":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/"}],"descriptions":[{"description":"The extensive use of Information and Communication Technology in critical infrastructures such as Industrial Control Systems make them vulnerable to cyber-attacks. One particular class of cyber-attacks is advanced persistent threats where highly skilled attackers can steal user authentication information's and move in the network from host to host until a valuable target is reached. The detection of the attacker should occur as soon as possible in order to take appropriate response, otherwise the attacker will have enough time to reach sensitive assets. When facing intelligent threats, intelligent solutions have to be designed. Therefore, in this paper, we take advantage of recent progress in deep learning to build a convolutional neural networks that can detect intrusions in cyber physical system. The Intrusion Detection System is applied on the NSL-KDD dataset and the performances of the proposed approach are presented and compared with the state of art. Results show the effectiveness of the techniques.","descriptionType":"Abstract"},{"description":"This submission has been withdrawn by arXiv administrators due to inappropriate text reuse from external sources","descriptionType":"Other"}],"geoLocations":[],"fundingReferences":[],"xml":"PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4KPHJlc291cmNlIHhtbG5zPSJodHRwOi8vZGF0YWNpdGUub3JnL3NjaGVtYS9rZXJuZWwtNCIgeG1sbnM6eHNpPSJodHRwOi8vd3d3LnczLm9yZy8yMDAxL1hNTFNjaGVtYS1pbnN0YW5jZSIgeHNpOnNjaGVtYUxvY2F0aW9uPSJodHRwOi8vZGF0YWNpdGUub3JnL3NjaGVtYS9rZXJuZWwtNCBodHRwOi8vc2NoZW1hLmRhdGFjaXRlLm9yZy9tZXRhL2tlcm5lbC00LjMvbWV0YWRhdGEueHNkIj4KICA8aWRlbnRpZmllciBpZGVudGlmaWVyVHlwZT0iRE9JIj4xMC40ODU1MC9BUlhJVi4xOTA1LjAzMTY4PC9pZGVudGlmaWVyPgogIDxhbHRlcm5hdGVJZGVudGlmaWVycz4KICAgIDxhbHRlcm5hdGVJZGVudGlmaWVyIGFsdGVybmF0ZUlkZW50aWZpZXJUeXBlPSJhclhpdiI+MTkwNS4wMzE2ODwvYWx0ZXJuYXRlSWRlbnRpZmllcj4KICA8L2FsdGVybmF0ZUlkZW50aWZpZXJzPgogIDxjcmVhdG9ycz4KICAgIDxjcmVhdG9yPgogICAgICA8Y3JlYXRvck5hbWUgbmFtZVR5cGU9IlBlcnNvbmFsIj5EZSBUZXlvdSwgR2FlbCBLYW1kZW08L2NyZWF0b3JOYW1lPgogICAgICA8Z2l2ZW5OYW1lPkdhZWwgS2FtZGVtPC9naXZlbk5hbWU+CiAgICAgIDxmYW1pbHlOYW1lPkRlIFRleW91PC9mYW1pbHlOYW1lPgogICAgPC9jcmVhdG9yPgogICAgPGNyZWF0b3I+CiAgICAgIDxjcmVhdG9yTmFtZSBuYW1lVHlwZT0iUGVyc29uYWwiPlppYXpldCwgSnVuaW9yPC9jcmVhdG9yTmFtZT4KICAgICAgPGdpdmVuTmFtZT5KdW5pb3I8L2dpdmVuTmFtZT4KICAgICAgPGZhbWlseU5hbWU+WmlhemV0PC9mYW1pbHlOYW1lPgogICAgPC9jcmVhdG9yPgogIDwvY3JlYXRvcnM+CiAgPHRpdGxlcz4KICAgIDx0aXRsZT5Db252b2x1dGlvbmFsIE5ldXJhbCBOZXR3b3JrIGZvciBJbnRydXNpb24gRGV0ZWN0aW9uIFN5c3RlbSBJbiBDeWJlciBQaHlzaWNhbCBTeXN0ZW1zPC90aXRsZT4KICA8L3RpdGxlcz4KICA8cHVibGlzaGVyPmFyWGl2PC9wdWJsaXNoZXI+CiAgPHB1YmxpY2F0aW9uWWVhcj4yMDE5PC9wdWJsaWNhdGlvblllYXI+CiAgPHN1YmplY3RzPgogICAgPHN1YmplY3QgeG1sOmxhbmc9ImVuIiBzdWJqZWN0U2NoZW1lPSJhclhpdiI+Q3J5cHRvZ3JhcGh5IGFuZCBTZWN1cml0eSAoY3MuQ1IpPC9zdWJqZWN0PgogICAgPHN1YmplY3QgeG1sOmxhbmc9ImVuIiBzdWJqZWN0U2NoZW1lPSJhclhpdiI+TWFjaGluZSBMZWFybmluZyAoY3MuTEcpPC9zdWJqZWN0PgogICAgPHN1YmplY3Qgc3ViamVjdFNjaGVtZT0iRmllbGRzIG9mIFNjaWVuY2UgYW5kIFRlY2hub2xvZ3kgKEZPUykiPkZPUzogQ29tcHV0ZXIgYW5kIGluZm9ybWF0aW9uIHNjaWVuY2VzPC9zdWJqZWN0PgogIDwvc3ViamVjdHM+CiAgPGRhdGVzPgogICAgPGRhdGUgZGF0ZVR5cGU9IlN1Ym1pdHRlZCIgZGF0ZUluZm9ybWF0aW9uPSJ2MSI+MjAxOS0wNS0wOFQxNTo1MzozNVo8L2RhdGU+CiAgICA8ZGF0ZSBkYXRlVHlwZT0iVXBkYXRlZCIgZGF0ZUluZm9ybWF0aW9uPSJ2MSI+MjAxOS0wNS0wOVQwMDoxNzo0MFo8L2RhdGU+CiAgICA8ZGF0ZSBkYXRlVHlwZT0iV2l0aGRyYXduIiBkYXRlSW5mb3JtYXRpb249InYyOyBUaGlzIHN1Ym1pc3Npb24gaGFzIGJlZW4gd2l0aGRyYXduIGJ5IGFyWGl2IGFkbWluaXN0cmF0b3JzIGR1ZSB0byBpbmFwcHJvcHJpYXRlIHRleHQgcmV1c2UgZnJvbSBleHRlcm5hbCBzb3VyY2VzIj4yMDE5LTA2LTA3VDE1OjMyOjQzWjwvZGF0ZT4KICAgIDxkYXRlIGRhdGVUeXBlPSJVcGRhdGVkIiBkYXRlSW5mb3JtYXRpb249InYyIj4yMDE5LTA2LTEwVDAwOjE1OjM3WjwvZGF0ZT4KICAgIDxkYXRlIGRhdGVUeXBlPSJBdmFpbGFibGUiIGRhdGVJbmZvcm1hdGlvbj0idjEiPjIwMTktMDU8L2RhdGU+CiAgPC9kYXRlcz4KICA8cmVzb3VyY2VUeXBlIHJlc291cmNlVHlwZUdlbmVyYWw9IlByZXByaW50Ij5BcnRpY2xlPC9yZXNvdXJjZVR5cGU+CiAgPHZlcnNpb24+MjwvdmVyc2lvbj4KICA8cmlnaHRzTGlzdD4KICAgIDxyaWdodHMgcmlnaHRzVVJJPSJodHRwOi8vYXJ4aXYub3JnL2xpY2Vuc2VzL25vbmV4Y2x1c2l2ZS1kaXN0cmliLzEuMC8iPmFyWGl2Lm9yZyBwZXJwZXR1YWwsIG5vbi1leGNsdXNpdmUgbGljZW5zZTwvcmlnaHRzPgogIDwvcmlnaHRzTGlzdD4KICA8ZGVzY3JpcHRpb25zPgogICAgPGRlc2NyaXB0aW9uIGRlc2NyaXB0aW9uVHlwZT0iQWJzdHJhY3QiPlRoZSBleHRlbnNpdmUgdXNlIG9mIEluZm9ybWF0aW9uIGFuZCBDb21tdW5pY2F0aW9uIFRlY2hub2xvZ3kgaW4gY3JpdGljYWwgaW5mcmFzdHJ1Y3R1cmVzIHN1Y2ggYXMgSW5kdXN0cmlhbCBDb250cm9sIFN5c3RlbXMgbWFrZSB0aGVtIHZ1bG5lcmFibGUgdG8gY3liZXItYXR0YWNrcy4gT25lIHBhcnRpY3VsYXIgY2xhc3Mgb2YgY3liZXItYXR0YWNrcyBpcyBhZHZhbmNlZCBwZXJzaXN0ZW50IHRocmVhdHMgd2hlcmUgaGlnaGx5IHNraWxsZWQgYXR0YWNrZXJzIGNhbiBzdGVhbCB1c2VyIGF1dGhlbnRpY2F0aW9uIGluZm9ybWF0aW9uJ3MgYW5kIG1vdmUgaW4gdGhlIG5ldHdvcmsgZnJvbSBob3N0IHRvIGhvc3QgdW50aWwgYSB2YWx1YWJsZSB0YXJnZXQgaXMgcmVhY2hlZC4gVGhlIGRldGVjdGlvbiBvZiB0aGUgYXR0YWNrZXIgc2hvdWxkIG9jY3VyIGFzIHNvb24gYXMgcG9zc2libGUgaW4gb3JkZXIgdG8gdGFrZSBhcHByb3ByaWF0ZSByZXNwb25zZSwgb3RoZXJ3aXNlIHRoZSBhdHRhY2tlciB3aWxsIGhhdmUgZW5vdWdoIHRpbWUgdG8gcmVhY2ggc2Vuc2l0aXZlIGFzc2V0cy4gV2hlbiBmYWNpbmcgaW50ZWxsaWdlbnQgdGhyZWF0cywgaW50ZWxsaWdlbnQgc29sdXRpb25zIGhhdmUgdG8gYmUgZGVzaWduZWQuIFRoZXJlZm9yZSwgaW4gdGhpcyBwYXBlciwgd2UgdGFrZSBhZHZhbnRhZ2Ugb2YgcmVjZW50IHByb2dyZXNzIGluIGRlZXAgbGVhcm5pbmcgdG8gYnVpbGQgYSBjb252b2x1dGlvbmFsIG5ldXJhbCBuZXR3b3JrcyB0aGF0IGNhbiBkZXRlY3QgaW50cnVzaW9ucyBpbiBjeWJlciBwaHlzaWNhbCBzeXN0ZW0uIFRoZSBJbnRydXNpb24gRGV0ZWN0aW9uIFN5c3RlbSBpcyBhcHBsaWVkIG9uIHRoZSBOU0wtS0REIGRhdGFzZXQgYW5kIHRoZSBwZXJmb3JtYW5jZXMgb2YgdGhlIHByb3Bvc2VkIGFwcHJvYWNoIGFyZSBwcmVzZW50ZWQgYW5kIGNvbXBhcmVkIHdpdGggdGhlIHN0YXRlIG9mIGFydC4gUmVzdWx0cyBzaG93IHRoZSBlZmZlY3RpdmVuZXNzIG9mIHRoZSB0ZWNobmlxdWVzLjwvZGVzY3JpcHRpb24+CiAgICA8ZGVzY3JpcHRpb24gZGVzY3JpcHRpb25UeXBlPSJPdGhlciI+VGhpcyBzdWJtaXNzaW9uIGhhcyBiZWVuIHdpdGhkcmF3biBieSBhclhpdiBhZG1pbmlzdHJhdG9ycyBkdWUgdG8gaW5hcHByb3ByaWF0ZSB0ZXh0IHJldXNlIGZyb20gZXh0ZXJuYWwgc291cmNlczwvZGVzY3JpcHRpb24+CiAgPC9kZXNjcmlwdGlvbnM+CjwvcmVzb3VyY2U+","url":"https://arxiv.org/abs/1905.03168","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"mds","isActive":true,"state":"findable","reason":null,"viewCount":0,"viewsOverTime":[],"downloadCount":0,"downloadsOverTime":[],"referenceCount":0,"citationCount":0,"citationsOverTime":[],"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":0,"created":"2022-02-28T06:03:06.000Z","registered":"2022-02-28T06:03:09.000Z","published":"2019","updated":"2022-02-28T06:03:09.000Z"},"relationships":{"client":{"data":{"id":"arxiv.content","type":"clients"}},"provider":{"data":{"id":"arxiv","type":"providers"}},"media":{"data":{"id":"10.48550/arxiv.1905.03168","type":"media"}},"references":{"data":[]},"citations":{"data":[]},"parts":{"data":[]},"partOf":{"data":[]},"versions":{"data":[]},"versionOf":{"data":[]}}}}