Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/520022
Title: Deep learning techniques for privacy preserving cyber security in the industrial internet of things paradigm
Researcher: Radha, D
Guide(s): Kavitha, M G
Keywords: Computer Science
Computer Science Information Systems
Cyber security
Deep learning
Engineering and Technology
Industrial internet of things
University: Anna University
Completed Date: 2023
Abstract: At present, there is an urgent need for globally competitive newlineproducts with more variability, better as well as dependable quality, reduced newlinecost, and shorter life cycles. The espousal of the Internet of Things (IoT) in newlineindustrial applications leverages communication between people, data newlineanalytics, and smart machines to meet the new demands in the market while newlinecontinuing to realize their business goals. Industrial Internet, also known as newlinethe Industrial Internet of Things (IIoT) optimizes production schedules, newlinecoordinates industrial processes, enhances operational efficiency and newlineproductivity, reduces asset downtime and cost, and minimizes human error in newlineseveral industries such as aerospace, automobile, agriculture, healthcare, newlinetransportation, energy, etc. The IIoT networks contain smart sensors, actuators, instruments, newlineembedded software, and distributed communication networks to collect, newlineprocess, analyze, and communicate a huge volume of data. The privacysensitive newlineand security-critical telemetry data in IIoT networks make them newlinetempting targets for cyberattacks where malicious agents can easily gain newlineaccess to insecure IIoT devices. The IIoT network is characterized by rigorous newlinetimeliness constraints and functions with solemn security and/or financial loss newlineimplications in the event of a security breach. An intrusion detection system newline(IDS) is an indispensable cog that has been widely used in IIoT networks to newlinerecognize malevolent network activities. IDS models sense malevolent newlineinstances and create a salubrious environment for business. newlineNumerous prevailing computing models integrate distributed and newlinecoordinated services using artificial intelligence (AI) methods (e. g., newlinealgorithms for data and text mining, machine learning (ML), deep learning newline(DL), etc.), communication technology, and data science for designing newline cybersecurity tools. Even though DL-based IDSs perform better in identifying newlinenew cyberattacks they are frequently hampered by some restrictions including newlinehigher false alarm rates, deprived reliability, ineffectiv
Pagination: xvii,205p.
URI: http://hdl.handle.net/10603/520022
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File26.12 kBAdobe PDFView/Open
02_prelim pages.pdf3.04 MBAdobe PDFView/Open
03_content.pdf229.56 kBAdobe PDFView/Open
04_abstract.pdf271.88 kBAdobe PDFView/Open
05_chapter 1.pdf824.69 kBAdobe PDFView/Open
06_chapter 2.pdf433.9 kBAdobe PDFView/Open
07_chapter 3.pdf1.76 MBAdobe PDFView/Open
08_chapter 4.pdf5.39 MBAdobe PDFView/Open
09_chapter 5.pdf4.66 MBAdobe PDFView/Open
10_chapter 6.pdf3.41 MBAdobe PDFView/Open
11_annexures.pdf102.37 kBAdobe PDFView/Open
80_recommendation.pdf98.06 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: