2022
DOI: 10.1007/s00500-022-06921-3
|View full text |Cite
|
Sign up to set email alerts
|

Attack detection and prevention in IoT-SCADA networks using NK-classifier

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…The original contribution of this work was to ensure the properties of integrity, availability, and confidentiality for protecting the SCADA networks against anomalous activities. Justindhas et al [32] employed an Elephant Herding Optimization (EHO) integrated NK-RNN classification mechanism for improving the security of SCADA systems. In addition, a modified Elliptic Curve Cryptography (ECC) technique was used to prevent the network from attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The original contribution of this work was to ensure the properties of integrity, availability, and confidentiality for protecting the SCADA networks against anomalous activities. Justindhas et al [32] employed an Elephant Herding Optimization (EHO) integrated NK-RNN classification mechanism for improving the security of SCADA systems. In addition, a modified Elliptic Curve Cryptography (ECC) technique was used to prevent the network from attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In paper [25], an advanced optimization‐based machine learning model was deployed to increase the security of smart grid SCADA systems against the harmful network intrusions. Justindhas and Jeyanthi [26] deployed an Elephant Herding Optimization (EHO) based classification model for identifying intrusions from the smart grid SCADA systems. In addition to that, a modified Elliptic Curve Cryptography (ECC) mechanism was used to perform Caesar ciphering against the network attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Equations 2 and 3 represent the balanced equation for converting imbalanced data into balanced data, and the distance between two data points is calculated using equation (6).…”
Section: ) Smote and Rus Techniquesmentioning
confidence: 99%
“…An effective solution may be to introduce an optimal routing-based MAC protocol. Researchers believe that it will serve as an important medium for secure data transmission between IoT devices [6]. The concept can also be extended to intrusion detection systems (IDS) to detect unauthorized or malicious access [7].…”
Section: Introductionmentioning
confidence: 99%