4,378 research outputs found
GAN Augmented Text Anomaly Detection with Sequences of Deep Statistics
Anomaly detection is the process of finding data points that deviate from a
baseline. In a real-life setting, anomalies are usually unknown or extremely
rare. Moreover, the detection must be accomplished in a timely manner or the
risk of corrupting the system might grow exponentially. In this work, we
propose a two level framework for detecting anomalies in sequences of discrete
elements. First, we assess whether we can obtain enough information from the
statistics collected from the discriminator's layers to discriminate between
out of distribution and in distribution samples. We then build an unsupervised
anomaly detection module based on these statistics. As to augment the data and
keep track of classes of known data, we lean toward a semi-supervised
adversarial learning applied to discrete elements.Comment: 5 pages, 53rd Annual Conference on Information Sciences and Systems,
CISS 201
Assessing and augmenting SCADA cyber security: a survey of techniques
SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability
- …