Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/522324
Title: | A novel detection of intrusion attacks using machine learning techniques in industrial IoT |
Researcher: | Sudhakar K |
Guide(s): | Senthilkumar S |
Keywords: | Computer Science Computer Science Information Systems Engineering and Technology |
University: | Anna University |
Completed Date: | 2023 |
Abstract: | The Industrial Internet of Things (IIoT) is a decentralized network newlineand it is self-organize and active networks where the nodes with data are newlinestimulated at random way. Here, the various intrusions are presented to newlinedistress the network performance resulted with increased traffic. newlineNetwork attack detection systems are located at a fundamental position within newlinenetwork to examine traffic to and from each device on the network. newlineA malicious attack detection system is used for detecting the access point to newlineprovide higher detection accuracy. The network faces more risk at various newlineintrusions due to its characteristics such as communication through wireless newlinelinks, resource constraints, and dynamic topology. It performs the network newlineintrusion detection but it s difficult to identify the exploitation activities by newlinemonitoring and classifying the normal or anomalous. But, sensitivity and newlineprecision metrics failed to be improved. Recently, many research works have been considered for attaining enhanced attack detection accuracy in IIoT network. During attack detection, feature selection and data classification is most considerable task for minimizing data traffic occurrences. The effective performance of feature newlineextraction helps to detect attack data with higher accuracy with removal of newlineirrelevant features. After eliminating features from dataset, data with relevant newlinefeatures are considered to classify data. Classification is the process for newlineclassifying data for detecting attacks in IIoT network. newline newline |
Pagination: | xix, 164p. |
URI: | http://hdl.handle.net/10603/522324 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 181.11 kB | Adobe PDF | View/Open |
02_prelim_pages.pdf | 935.91 kB | Adobe PDF | View/Open | |
03_contents.pdf | 377.86 kB | Adobe PDF | View/Open | |
04_abstracts.pdf | 372.13 kB | Adobe PDF | View/Open | |
05_chapter1.pdf | 800.94 kB | Adobe PDF | View/Open | |
06_chapter2.pdf | 570.1 kB | Adobe PDF | View/Open | |
07_chapter3.pdf | 948.89 kB | Adobe PDF | View/Open | |
08_chapter4.pdf | 1.11 MB | Adobe PDF | View/Open | |
09_chapter5.pdf | 706.91 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 210.01 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 119.62 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: