Detection of Cyber Attacks within Nuclear Power Plants Using Deep Learning-Based Monitoring of Static Memory 


Vol. 50,  No. 12, pp. 1958-1965, Dec.  2025
10.7840/kics.2025.50.12.1958


PDF Full-Text
  Abstract

The Device that include modules used within a nuclear power plant is regulated to employ static memory rather than dynamic memory, as per the U.S. NRC (Nuclear Regulatory Commission) regulatory requirements. Therefore, this research proposes a deep learning-based attack detection system to identify normal and abnormal states in accordance with changes in static memory usage. The proposed system visualizes time-series data of memory usage using Markov Transition Field (MTF) and employs LSTM Auto-Encoder (AE) for attack detection. It further proposes a model to classify attack types by visualizing the reconstructed data and analyzes its performance. The analysis results demonstrate that the proposed system effectively detects and classifies attacks in static memory systems.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Related Articles
  Cite this article

[IEEE Style]

G. H. Lim and S. Y. Shin, "Detection of Cyber Attacks within Nuclear Power Plants Using Deep Learning-Based Monitoring of Static Memory," The Journal of Korean Institute of Communications and Information Sciences, vol. 50, no. 12, pp. 1958-1965, 2025. DOI: 10.7840/kics.2025.50.12.1958.

[ACM Style]

Gyu Hyun Lim and Soo Young Shin. 2025. Detection of Cyber Attacks within Nuclear Power Plants Using Deep Learning-Based Monitoring of Static Memory. The Journal of Korean Institute of Communications and Information Sciences, 50, 12, (2025), 1958-1965. DOI: 10.7840/kics.2025.50.12.1958.

[KICS Style]

Gyu Hyun Lim and Soo Young Shin, "Detection of Cyber Attacks within Nuclear Power Plants Using Deep Learning-Based Monitoring of Static Memory," The Journal of Korean Institute of Communications and Information Sciences, vol. 50, no. 12, pp. 1958-1965, 12. 2025. (https://doi.org/10.7840/kics.2025.50.12.1958)
Vol. 50, No. 12 Index