IoT- Enabled Cyber Physical Systems detection approaches and distribution of cyber attacks

Protecting IoT-enabled cyber-physical systems (CPS) can always be a problem because authentication mechanisms designed for standard information / operational technology systems do not succeed in CPS environments. As a result, the study adopted a cyber-intensive detection mechanism and identification...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:NeuroQuantology 2022-01, Vol.20 (9), p.4139
Hauptverfasser: Venkatesh, R J, Juliet, N, Nalini, A, Percis, E Sheeba, Uparkar, Satyajit Sidheshwar, Golar, Priti C
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Protecting IoT-enabled cyber-physical systems (CPS) can always be a problem because authentication mechanisms designed for standard information / operational technology systems do not succeed in CPS environments. As a result, the study adopted a cyber-intensive detection mechanism and identification method using CPS with an emphasis on control systems. These proposed attack detection and identification systems provide the basis for maintaining the security of CPS IoT systems. This methodology is provided to address the problem of CPS IoT data imbalances without ignoring minority classes or trying to balance the data. The proposed framework should be placed at the top of the protocol stack in order to passively analyse sensor information and issue an alert when an attack occurs. This data is provided to the attribution model for this scenario to detect the attacker's capabilities. In addition, by leveraging the timely and productive data of the proposed platform, security researchers, including emergency response teams, can respond to attacks and avoid potential losses. The detection and prevention steps use deeper representations to learn how to transform data into faster dimensions, but use DTs to identify attack data. The privacy of IoT devices, including these critical assets, is a major concern. IoT connections are another reason that are primarily generated through critical infrastructure. As a result, IoT vulnerabilities have a significant impact on the environment in which they are used. With the IoT, users and service providers will pay more attention to privacy and anonymity. This research paper proposes an innovative IoT-based cyber-physical system that uses two different methods of detection and distribution in cyber-attacks.
ISSN:1303-5150
DOI:10.14704/nq.2022.20.9.NQ44474