Interrelation between Temporal Coordinates and Intrusion Detection Techniques in Cyber Physical Systems

Network traffic and its temporal coordinates of flow are affected by factors such as traffic volume, peak or low usage times, and available resource bandwidth. The problem of perilous attacks that happen on wireless channels is mostly analysed in a time-invariant manner. The detection interval in fi...

Full description

Saved in:
Bibliographic Details
Published in2022 International Conference on Inventive Computation Technologies (ICICT) pp. 386 - 390
Main Authors Jacob, Stalin, Balanagireddy, G, Kumar, K Suresh, Vijay, M. M.
Format Conference Proceeding
LanguageEnglish
Published IEEE 20.07.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Network traffic and its temporal coordinates of flow are affected by factors such as traffic volume, peak or low usage times, and available resource bandwidth. The problem of perilous attacks that happen on wireless channels is mostly analysed in a time-invariant manner. The detection interval in finding the attacks is also a sensitive time for denying further flows and establishing new flows. Time-critical applications mostly use "User Datagram Packets" for flooding. Entropy-based methods have been used to obtain the right set of features in a short period of time. A flow rule is being imposed with two protocols, the first focusing on entropy and the latter focusing on Gini-impurity. Simulation results for detection rate and detection latency on both the developed using network simulator -2.
ISSN:2767-7788
DOI:10.1109/ICICT54344.2022.9850633