{"id":"https://openalex.org/W3165422394","doi":"https://doi.org/10.12720/jcm.16.6.210-216","title":"An Autoencoder-Based Network Intrusion Detection System for the SCADA System","display_name":"An Autoencoder-Based Network Intrusion Detection System for the SCADA System","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3165422394","doi":"https://doi.org/10.12720/jcm.16.6.210-216","mag":"3165422394"},"language":"en","primary_location":{"id":"doi:10.12720/jcm.16.6.210-216","is_oa":true,"landing_page_url":"https://doi.org/10.12720/jcm.16.6.210-216","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.12720/jcm.16.6.210-216","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012109709","display_name":"Mustafa Altaha","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mustafa Altaha","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088903345","display_name":"Jae Myeong Lee","orcid":"https://orcid.org/0000-0001-5494-0653"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jae-Myeong Lee","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090095675","display_name":"Muhammad Aslam","orcid":"https://orcid.org/0000-0002-9697-6766"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Muhammad Aslam","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5050329084","display_name":"Sugwon Hong","orcid":"https://orcid.org/0000-0002-6184-9310"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sugwon Hong","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5012109709"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.9866,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.86661888,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"210","last_page":"216"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.964348554611206},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.8862192034721375},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7503030300140381},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7488171458244324},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.5864259004592896},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5842646956443787},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.557087242603302},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5402163863182068},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.44472068548202515},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.41978639364242554},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3972143530845642},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2566208839416504},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10983940958976746}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.964348554611206},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.8862192034721375},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7503030300140381},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7488171458244324},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.5864259004592896},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5842646956443787},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.557087242603302},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5402163863182068},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44472068548202515},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.41978639364242554},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3972143530845642},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2566208839416504},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10983940958976746},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.12720/jcm.16.6.210-216","is_oa":true,"landing_page_url":"https://doi.org/10.12720/jcm.16.6.210-216","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.12720/jcm.16.6.210-216","is_oa":true,"landing_page_url":"https://doi.org/10.12720/jcm.16.6.210-216","pdf_url":null,"source":{"id":"https://openalex.org/S184821498","display_name":"Journal of Communications","issn_l":"1796-2021","issn":["1796-2021","2374-4367"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4323867253","host_organization_name":"International Communication Association","host_organization_lineage":["https://openalex.org/P4323867253"],"host_organization_lineage_names":["International Communication Association"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1546161534","https://openalex.org/W2084724474","https://openalex.org/W2795147830","https://openalex.org/W2887195793","https://openalex.org/W2891698621","https://openalex.org/W2893861039","https://openalex.org/W2910068345","https://openalex.org/W2941775396","https://openalex.org/W2955158865","https://openalex.org/W2969699559","https://openalex.org/W2980576170","https://openalex.org/W2980759501","https://openalex.org/W2990623250","https://openalex.org/W2998254967","https://openalex.org/W3042948711","https://openalex.org/W3047042875","https://openalex.org/W3116784175"],"related_works":["https://openalex.org/W2615977515","https://openalex.org/W2115760278","https://openalex.org/W2669956259","https://openalex.org/W4249005693","https://openalex.org/W4392946183","https://openalex.org/W3088732000","https://openalex.org/W3173705016","https://openalex.org/W2367606288","https://openalex.org/W2141340249","https://openalex.org/W1605582558"],"abstract_inverted_index":{"The":[0,48,132],"intrusion":[1],"detection":[2,55,122],"system":[3],"(IDS)":[4],"is":[5,14,57,65],"the":[6,17,21,38,45,54,58,67,74,89,94,113,140],"main":[7],"tool":[8],"to":[9,111],"do":[10],"security":[11,18],"monitoring":[12],"that":[13,78],"one":[15],"of":[16,53,121],"strategies":[19],"for":[20,44],"supervisory":[22],"control":[23],"and":[24,108,119,123],"data":[25,82,103],"acquisition":[26],"(SCADA)":[27],"system.":[28,47],"In":[29,97],"this":[30,98],"paper,":[31,99],"we":[32,79,100],"develop":[33],"an":[34],"IDS":[35,144],"based":[36],"on":[37],"autoencoder":[39,114],"deep":[40,129,142],"learning":[41,130,143],"model":[42,56,135],"(AE-IDS)":[43],"SCADA":[46,50,95],"target":[49],"communication":[51,71],"protocol":[52,72],"Distributed":[59],"Network":[60],"Protocol":[61],"3":[62],"(DNP3),":[63],"which":[64,87],"currently":[66],"most":[68,90],"commonly":[69],"utilized":[70],"in":[73,93],"power":[75],"substation.":[76],"Cyberattacks":[77],"consider":[80],"are":[81,88],"injection":[83],"or":[84],"modification":[85],"attacks,":[86],"critical":[91],"attacks":[92],"systems.":[96],"extracted":[101],"17":[102],"features":[104],"from":[105],"DNP3":[106],"communication,":[107],"use":[109],"them":[110,125],"train":[112],"network.":[115],"We":[116],"measure":[117],"accuracy":[118],"loss":[120],"compare":[124],"with":[126],"different":[127],"supervised":[128],"algorithms.":[131],"unsupervised":[133],"AE-IDS":[134],"shows":[136],"better":[137],"performance":[138],"than":[139],"other":[141],"models.":[145]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2021-06-07T00:00:00"}
