A Novel Hybrid Model Detection of Security Vulnerabilities in Industrial Control Systems and Iot Using Gcn Plus Lstm
dc.authorid | Koca, Murat/0000-0002-6048-7645 | |
dc.authorid | Avci, Dr. Isa/0000-0001-7032-8018 | |
dc.authorscopusid | 57295914300 | |
dc.authorscopusid | 57222404501 | |
dc.authorwosid | Koca, Murat/Grr-6566-2022 | |
dc.authorwosid | Avci, Dr. Isa/Aab-3436-2022 | |
dc.contributor.author | Koca, Murat | |
dc.contributor.author | Avci, Isa | |
dc.date.accessioned | 2025-05-10T17:34:44Z | |
dc.date.available | 2025-05-10T17:34:44Z | |
dc.date.issued | 2024 | |
dc.department | T.C. Van Yüzüncü Yıl Üniversitesi | en_US |
dc.department-temp | [Koca, Murat] Van Yuzuncu Yil Univ, Fac Engn, Dept Comp Engn, Kampus, TR-65080 Van, Turkiye; [Avci, Isa] Karabuk Univ, Fac Engn, Dept Comp Engn, TR-78050 Merkez, Karabuk, Turkiye | en_US |
dc.description | Koca, Murat/0000-0002-6048-7645; Avci, Dr. Isa/0000-0001-7032-8018 | en_US |
dc.description.abstract | In this study, we address critical security vulnerabilities in Industrial Control Systems (ICS) and the Internet of Things (IoT) by focusing on enhancing collaboration and communication among interconnected devices. Recognizing the inherent risks and the sophisticated nature of cyber threats in such environments, we introduce a novel and complex implementation that leverages the synergistic potential of Graph Convolutional Networks (GCN) and Long Short-Term Memory (LSTM) models. This approach is designed to intelligently predict and detect intrusion attempts by analyzing the dynamic interactions and data flow within networked systems. Our methodology not only differentiates between the operational nuances of various IoT routing mechanisms but also tackles the core design challenges faced by ICS. Through rigorous experimentation, including the deployment of our model in simulated high-risk scenarios, we have demonstrated its efficacy in identifying and mitigating deceptive connectivity disruptions with a remarkable accuracy rate of 99.99%. This performance underscores the models capability to serve as a robust security layer, ensuring the integrity and resilience of ICS networks against sophisticated cyber threats. Our findings contribute a significant advancement in the field of cybersecurity for ICS and IoT, proposing a comprehensive framework that can be centrally integrated with existing security information and incident management systems for enhanced protective measures. | en_US |
dc.description.woscitationindex | Science Citation Index Expanded | |
dc.identifier.doi | 10.1109/ACCESS.2024.3466391 | |
dc.identifier.endpage | 143351 | en_US |
dc.identifier.issn | 2169-3536 | |
dc.identifier.scopus | 2-s2.0-85205249229 | |
dc.identifier.scopusquality | Q1 | |
dc.identifier.startpage | 143343 | en_US |
dc.identifier.uri | https://doi.org/10.1109/ACCESS.2024.3466391 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14720/13901 | |
dc.identifier.volume | 12 | en_US |
dc.identifier.wos | WOS:001335903500001 | |
dc.identifier.wosquality | Q2 | |
dc.language.iso | en | en_US |
dc.publisher | Ieee-inst Electrical Electronics Engineers inc | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Internet Of Things | en_US |
dc.subject | Security | en_US |
dc.subject | Accuracy | en_US |
dc.subject | Telecommunication Traffic | en_US |
dc.subject | Monitoring | en_US |
dc.subject | Long Short Term Memory | en_US |
dc.subject | Object Recognition | en_US |
dc.subject | Ad Hoc Networks | en_US |
dc.subject | Graph Convolutional Networks | en_US |
dc.subject | Industrial Control | en_US |
dc.subject | Intrusion Detection | en_US |
dc.subject | Ad-Hoc Network | en_US |
dc.subject | Graph Convolutional Networks (Gcn) | en_US |
dc.subject | Industrial Control System (Ics) | en_US |
dc.subject | Internet Of Things (Iot) | en_US |
dc.subject | Intrusion Detection System (Ids) | en_US |
dc.subject | Security Vulnerabilities | en_US |
dc.title | A Novel Hybrid Model Detection of Security Vulnerabilities in Industrial Control Systems and Iot Using Gcn Plus Lstm | en_US |
dc.type | Article | en_US |