Interrelation between Temporal Coordinates and Intrusion Detection Techniques in Cyber Physical Systems
Network traffic and its temporal coordinates of flow are affected by factors such as traffic volume, peak or low usage times, and available resource bandwidth. The problem of perilous attacks that happen on wireless channels is mostly analysed in a time-invariant manner. The detection interval in fi...
Saved in:
Published in | 2022 International Conference on Inventive Computation Technologies (ICICT) pp. 386 - 390 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
20.07.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Network traffic and its temporal coordinates of flow are affected by factors such as traffic volume, peak or low usage times, and available resource bandwidth. The problem of perilous attacks that happen on wireless channels is mostly analysed in a time-invariant manner. The detection interval in finding the attacks is also a sensitive time for denying further flows and establishing new flows. Time-critical applications mostly use "User Datagram Packets" for flooding. Entropy-based methods have been used to obtain the right set of features in a short period of time. A flow rule is being imposed with two protocols, the first focusing on entropy and the latter focusing on Gini-impurity. Simulation results for detection rate and detection latency on both the developed using network simulator -2. |
---|---|
ISSN: | 2767-7788 |
DOI: | 10.1109/ICICT54344.2022.9850633 |