Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/342022
Title: | Design of intrusion detection system in wireless networked closed loop control system |
Researcher: | Benisha, R B |
Guide(s): | Raja Ratna, S |
Keywords: | Engineering and Technology Computer Science Computer Science Information Systems Cyberspace Wireless network |
University: | Anna University |
Completed Date: | 2021 |
Abstract: | Due to an increase in growth of the wireless networks, protecting newlinethe network from malicious activities has become greater importance. As a wireless network is constructed on an open space, the intruders can easily indulge in corruption activities. The intruder monitors the activities in the network to prevent the users from accessing network resources and also from communication. Different types of attacks are obtained in the network to prevent the users from using specified resources of the network. The Interruption attack, Bias Injection attack, and Power System attack are the three different types of attacks that are mainly occurring in the Supervisory Control and Data Acquisition (SCADA) network at different layers. These attacks interfere with the transmission and reception of the Physical layer, Medium Access Control (MAC) layer and Network layer in the wireless medium. An interruption attack is occurred by creating traffic, time delay, high-level noise and thereby effectively corrupting the packets at the physical layer. Bias Injection attack modifies the user information and transmits the altered information to the receiver at the MAC layer. Power System attacks occur only in the transmission of power values, thereby injecting false data during transmission at the Network layer. Consequently, the attackers block or alter data from successful data reception. Due to the distortions in the packet loss, the detection rate and accuracy are lowered with higher false-positive rates. The main objective of attackers is to block the information during transmission or reception of packets, also to corrupt the packets and inject false data to the receiver side. The presence of these attacks degrades the performance of the SCADA network and its services. If multiple attackers collude together, the attack becomes extremely serious. As intrusion is a serious threat to network security, it should be efficiently handled. Hence, newline newline |
Pagination: | xxx,219 p. |
URI: | http://hdl.handle.net/10603/342022 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 23.71 kB | Adobe PDF | View/Open |
02_certificates.pdf | 95.5 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 160.56 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 131.14 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 15.09 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 160.26 kB | Adobe PDF | View/Open | |
07_contents.pdf | 11.24 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 4.66 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 10.39 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 22.1 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 64.87 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 81.41 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 949.23 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 1.07 MB | Adobe PDF | View/Open | |
15_chapter5.pdf | 720.18 kB | Adobe PDF | View/Open | |
16_conclusion.pdf | 31.03 kB | Adobe PDF | View/Open | |
17_references.pdf | 492.85 kB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 43.07 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 76.29 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: