Home Physical Sciences Applying artificial intelligence techniques to intrusion detection systems in serial-based industrial networks
Chapter
Licensed
Unlicensed Requires Authentication

Applying artificial intelligence techniques to intrusion detection systems in serial-based industrial networks

  • Ralf Luis de Moura , Virginia N. L. Franqueira , Gustavo Pessin and Ralf L. Moura Filho
Become an author with De Gruyter Brill
Cybersecurity
This chapter is in the book Cybersecurity

Abstract

Industrial control systems often rely on serial-based networks that lack robust cybersecurity measures, making them vulnerable to attacks as they increasingly integrate with corporate networks. While intrusion detection systems (IDSs) are extensively used in Ethernet-based networks, their adoption in serial-based networks remains limited. This chapter investigates the application of artificial intelligence (AI) techniques to enhance intrusion detection in these networks. By combining rule-based methods with supervised and unsupervised learning, AI-powered IDS can detect known and novel attacks effectively. The chapter reviews AI techniques, compares their effectiveness, and highlights their potential to extend cybersecurity measures to the most vulnerable layers of industrial networks. The findings emphasize the critical role of AI in safeguarding industrial serial-based systems and propose strategies for developing IDS, tailored to their unique requirements, addressing challenges such as legacy system constraints and the need for real-time anomaly detection.

Abstract

Industrial control systems often rely on serial-based networks that lack robust cybersecurity measures, making them vulnerable to attacks as they increasingly integrate with corporate networks. While intrusion detection systems (IDSs) are extensively used in Ethernet-based networks, their adoption in serial-based networks remains limited. This chapter investigates the application of artificial intelligence (AI) techniques to enhance intrusion detection in these networks. By combining rule-based methods with supervised and unsupervised learning, AI-powered IDS can detect known and novel attacks effectively. The chapter reviews AI techniques, compares their effectiveness, and highlights their potential to extend cybersecurity measures to the most vulnerable layers of industrial networks. The findings emphasize the critical role of AI in safeguarding industrial serial-based systems and propose strategies for developing IDS, tailored to their unique requirements, addressing challenges such as legacy system constraints and the need for real-time anomaly detection.

Chapters in this book

  1. Frontmatter I
  2. Preface V
  3. Contents IX
  4. List of contributing authors XI
  5. Game-based testing for active cyberdefense and cyberdeception 1
  6. Graph-ensemble methods for generating malware behavioral signatures 31
  7. Efficient cyber threat detection on SCADA systems using feature-grouped generative adversarial networks 57
  8. Applying artificial intelligence techniques to intrusion detection systems in serial-based industrial networks 71
  9. A hybrid intelligent intrusion detection system 91
  10. PwnPilot: could an adversary be pair programming with our most trusted software engineers? 109
  11. How to attack a far galaxy and beyond 145
  12. Injecting uniform chaotic sequences into an ANN’s learning fabric to reduce overfitting 179
  13. Effectiveness of machine learning and deep learning in cybersecurity 199
  14. Quantum-enhanced cyber threat detection with mini-batch optimization 215
  15. Future of auditable AI systems 231
  16. Virtual cybersecurity testbeds for industrial Internet of Things 255
  17. Security verification of authenticated encryption with associated data under chosen message attack assumption using Tamarin prover 281
  18. Security and privacy challenges in Internet of Medical Things (IoMT) using RFID and sensor nodes 319
  19. Empowering users with an effective tool for social media spam detection 333
  20. Comparative analysis of email digital forensics tools validation 355
  21. An implementation of a web platform for training in phishing attack detection using cognitive security, cognitive psychology, and game theory 383
  22. Index 411
  23. De Gruyter Series in Intelligent Computing
Downloaded on 25.1.2026 from https://www.degruyterbrill.com/document/doi/10.1515/9783111436548-004/html
Scroll to top button