{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:00:41Z","timestamp":1743055241495,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031783791"},{"type":"electronic","value":"9783031783807"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78380-7_14","type":"book-chapter","created":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T15:51:49Z","timestamp":1737993109000},"page":"165-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["I2DS: FPGA-Based Deep Learning Industrial Intrusion Detection System"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9750-5977","authenticated-orcid":false,"given":"Ioannis","family":"Morianos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6600-4907","authenticated-orcid":false,"given":"Konstantinos","family":"Georgopoulos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7479-5190","authenticated-orcid":false,"given":"Andreas","family":"Brokalakis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0654-1452","authenticated-orcid":false,"given":"Thomas","family":"Kyriakakis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9340-2241","authenticated-orcid":false,"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,28]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, A.: TON_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access 8, 165130\u2013165150 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3022862","journal-title":"IEEE Access"},{"issue":"4","key":"14_CR2","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/TDSC.2006.44","volume":"3","author":"ZK Baker","year":"2006","unstructured":"Baker, Z.K., Prasanna, V.K.: Automatic synthesis of efficient intrusion detection systems on FPGAs. IEEE Trans. Dependable Secure Comput. 3(4), 289\u2013300 (2006). https:\/\/doi.org\/10.1109\/TDSC.2006.44","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"14_CR3","doi-asserted-by":"publisher","unstructured":"Blott, M., et al.: FINN-R: an end-to-end deep-learning framework for fast exploration of quantized neural networks. ACM Trans. Reconfigurable Technol. Syst. 11(3) (2018). https:\/\/doi.org\/10.1145\/3242897","DOI":"10.1145\/3242897"},{"key":"14_CR4","doi-asserted-by":"publisher","unstructured":"Deyannis, D., Papadogiannaki, E., Chrysos, G., Georgopoulos, K., Ioannidis, S.: The diversification and enhancement of an ids scheme for the cybersecurity needs of modern supply chains. Electronics 11(13) (2022). https:\/\/doi.org\/10.3390\/electronics11131944","DOI":"10.3390\/electronics11131944"},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"Dhirani, L.L., Armstrong, E., Newe, T.: Industrial IoT, cyber threats, and standards landscape: evaluation and roadmap. Sensors 21(11) (2021). https:\/\/doi.org\/10.3390\/s21113901","DOI":"10.3390\/s21113901"},{"key":"14_CR6","unstructured":"Fahim, F., et al.: hls4ml: An open-source codesign workflow to empower scientific low-power machine learning devices (2021)"},{"issue":"1","key":"14_CR7","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garc\u00eda-Teodoro","year":"2009","unstructured":"Garc\u00eda-Teodoro, P., D\u00edaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1), 18\u201328 (2009). https:\/\/doi.org\/10.1016\/j.cose.2008.08.003","journal-title":"Comput. Secur."},{"key":"14_CR8","doi-asserted-by":"publisher","unstructured":"Hidayat, I., Ali, M., Arshad, A.: Machine learning-based intrusion detection system: an experimental comparison. J. Comput. Cogn. Eng. 2 (2022). https:\/\/doi.org\/10.47852\/bonviewJCCE2202270","DOI":"10.47852\/bonviewJCCE2202270"},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Ioannou, L., Fahmy, S.A.: Network intrusion detection using neural networks on FPGA SoCs. In: 2019 29th International Conference on Field Programmable Logic and Applications (FPL), pp. 232\u2013238 (2019). https:\/\/doi.org\/10.1109\/FPL.2019.00043","DOI":"10.1109\/FPL.2019.00043"},{"key":"14_CR10","doi-asserted-by":"publisher","unstructured":"Kim, J., Park, J.: FPGA-based network intrusion detection for IEC 61850-based industrial network. ICT Express 4(1), 1\u20135 (2018). https:\/\/doi.org\/10.1016\/j.icte.2018.01.002 , sI: CI Smart Grid Cyber Security","DOI":"10.1016\/j.icte.2018.01.002"},{"key":"14_CR11","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Pereira, F., Burges, C., Bottou, L., Weinberger, K. (eds.) Adv. Neural Inf. Process. Syst. 25. Curran Associates, Inc. (2012)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Le\u00a0Jeune, L., Goedem\u00e9, T., Mentens, N.: Towards real-time deep learning-based network intrusion detection on FPGA. In: Applied Cryptography and Network Security Workshops, pp. 133\u2013150. Springer International Publishing, Cham (2021)","DOI":"10.1007\/978-3-030-81645-2_9"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"102994","DOI":"10.1016\/j.scs.2021.102994","volume":"72","author":"N Moustafa","year":"2021","unstructured":"Moustafa, N.: A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets. Sustain. Urban Areas 72, 102994 (2021). https:\/\/doi.org\/10.1016\/j.scs.2021.102994","journal-title":"Sustain. Urban Areas"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Ngo, D.M., Temko, A., Murphy, C.C., Popovici, E.: FPGA hardware acceleration framework for anomaly-based intrusion detection system in IoT. In: 2021 31st International Conference on Field-Programmable Logic and Applications (FPL), pp. 69\u201375. IEEE (2021)","DOI":"10.1109\/FPL53798.2021.00020"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Papadogiannaki, E., Chrysos, G., Georgopoulos, K., Ioannidis, S.: A reconfigurable IDS framework for encrypted and non-encrypted network data in supply chains. In: 9th International Conference on Engineering and Emerging Technologies (ICEET), pp. 1\u20136 (2023)","DOI":"10.1109\/ICEET60227.2023.10525930"},{"key":"14_CR16","unstructured":"Bro, P.V.: A system for detecting network intruders in Real-Time. In: 7th USENIX Security Symposium (USENIX Security 98). USENIX Association, San Antonio, TX (1998)"},{"key":"14_CR17","unstructured":"Roesch, M.: Snort - lightweight intrusion detection for networks. In: Proceedings of the 13th USENIX Conference on System Administration, p. 229\u2013238. LISA 1999, USENIX Association, USA (1999)"},{"key":"14_CR18","doi-asserted-by":"publisher","unstructured":"Rybalkin, V., Pappalardo, A., Ghaffar, M., Gambardella, G., Wehn, N., Blott, M.: FINN-L: library extensions and design trade-off analysis for variable precision LSTM networks on FPGAs. In: 2018 28th International Conference on Field Programmable Logic and Applications (FPL), pp. 89\u2013897. IEEE Computer Society, Los Alamitos, CA, USA (2018). https:\/\/doi.org\/10.1109\/FPL.2018.00024","DOI":"10.1109\/FPL.2018.00024"},{"key":"14_CR19","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","volume":"61","author":"J Schmidhuber","year":"2015","unstructured":"Schmidhuber, J.: Deep learning in neural networks: an overview. Neural Netw. 61, 85\u2013117 (2015). https:\/\/doi.org\/10.1016\/j.neunet.2014.09.003","journal-title":"Neural Netw."},{"issue":"1","key":"14_CR20","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A deep learning approach to network intrusion detection. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 41\u201350 (2018). https:\/\/doi.org\/10.1109\/TETCI.2017.2772792","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Sourdis, I., Pnevmatikatos, D.: Fast, large-scale string match for a 10Gbps FPGA-based network intrusion detection system. In: Y.K. Cheung, P., Constantinides, G.A. (eds.) Field Programmable Logic and Application, pp. 880\u2013889. Springer Berlin Heidelberg, Berlin, Heidelberg (2003)","DOI":"10.1007\/978-3-540-45234-8_85"},{"issue":"10","key":"14_CR22","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"CF Tsai","year":"2009","unstructured":"Tsai, C.F., Hsu, Y.F., Lin, C.Y., Lin, W.Y.: Intrusion detection by machine learning: a review. Expert Syst. Appl. 36(10), 11994\u201312000 (2009). https:\/\/doi.org\/10.1016\/j.eswa.2009.05.029","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"14_CR23","doi-asserted-by":"publisher","first-page":"163","DOI":"10.3390\/iot2010009","volume":"2","author":"K Tsiknas","year":"2021","unstructured":"Tsiknas, K., Taketzis, D., Demertzis, K., Skianis, C.: Cyber threats to industrial IoT: a survey on attacks and countermeasures. IoT 2(1), 163\u2013186 (2021). https:\/\/doi.org\/10.3390\/iot2010009","journal-title":"IoT"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Umuroglu, Y., Akhauri, Y., Fraser, N.J., Blott, M.: LogicNets: co-designed neural networks and circuits for extreme-throughput applications. In: Proceedings of the International Conference on Field-Programmable Logic and Applications, pp. 291\u2013297. IEEE Computer Society, Los Alamitos, CA, USA (2020)","DOI":"10.1109\/FPL50879.2020.00055"},{"key":"14_CR25","doi-asserted-by":"publisher","unstructured":"Umuroglu, Y., et al.: FINN: a framework for fast, scalable binarized neural network inference. In: Proceedings of the 2017 ACM\/SIGDA International Symposium on Field-Programmable Gate Arrays, p. 65\u201374. FPGA 2017, Association for Computing Machinery, New York, NY, USA (2017). https:\/\/doi.org\/10.1145\/3020078.3021744","DOI":"10.1145\/3020078.3021744"},{"key":"14_CR26","doi-asserted-by":"publisher","unstructured":"Weyand, T., Kostrikov, I., Philbin, J.: PlaNet - photo geolocation with convolutional neural networks. In: Computer Vision\u2013ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11-14, 2016, Proceedings, Part VIII 14, pp. 37\u201355. Springer International Publishing (2016). https:\/\/doi.org\/10.1007\/978-3-319-46484-8_3","DOI":"10.1007\/978-3-319-46484-8_3"},{"key":"14_CR27","doi-asserted-by":"publisher","first-page":"119904","DOI":"10.1109\/ACCESS.2019.2933165","volume":"7","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Chen, X., Guo, D., Song, M., Teng, Y., Wang, X.: PCCN: parallel cross convolutional neural network for abnormal network traffic flows detection in multi-class imbalanced network traffic flows. IEEE Access 7, 119904\u2013119916 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2933165","journal-title":"IEEE Access"},{"key":"14_CR28","unstructured":"Zhao, Z., Sadok, H., Atre, N., Hoe, J.C., Sekar, V., Sherry, J.: Achieving 100gbps intrusion prevention on a single server. In: 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20), pp. 1083\u20131100. USENIX Association (2020)"}],"container-title":["Lecture Notes in Computer Science","Embedded Computer Systems: Architectures, Modeling, and Simulation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78380-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T15:51:54Z","timestamp":1737993114000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78380-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031783791","9783031783807"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78380-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"28 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAMOS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Samos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"samos2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/samos-conference.com\/wp\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}