
AI-driven cyber defense strengthens resilience of critical infrastructure
Published on: Sept. 24, 2025, 11:25 p.m. | Source: Devdiscourse
ICS are particularly vulnerable because they often rely on legacy systems, lack strong authentication, and cannot tolerate downtime, the study says. To address these weaknesses, the researchers deployed machine learning models on the ICS-Flow dataset, which includes real-world attack types such as denial-of-service, man-in-the-middle, and replay intrusions.