Please use this identifier to cite or link to this item: https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/16613
Full metadata record
DC FieldValueLanguage
dc.contributor.authorArumugam, Sajeev Ram-
dc.contributor.authorPaul, P Mano-
dc.contributor.authorIssac, Berin Jeba Jingle-
dc.contributor.authorAnanth, J P-
dc.date.accessioned2024-08-29T05:43:39Z-
dc.date.available2024-08-29T05:43:39Z-
dc.date.issued2024-
dc.identifier.issn0890-6327-
dc.identifier.urihttps://doi.org/10.1002/acs.3855-
dc.identifier.urihttps://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/16613-
dc.description.abstractIntrustion Detection System (IDS) refers to the gear or software that monitors a network or system for malicious activity or policy violations. Periodically, the system records any intrusion action or breach, which frequently modifies the administrator. Cyber Physical System (CPS) is particularly called as networked connected system, in which the system components are spatially distributed and integrated via the communication network. The control mechanism ensures computation significance; however, the system does affect attacks. Researchers are trying to handle this issue via the existing anomaly datasets. In this way, this paper follows an intrusion detection system under three major stages including extraction of features, selection of feature, and detection. The primary stage is the extraction of Statistical features like standard deviation, mean, mode, variance, and median, as well as higher-order statistical features like moment, percentile, improved correlation, kurtosis, mutual information, skewness, flow-based features, and information gain-based features. The curse of dimensionality becomes a significant problem in this scenario, so it is crucial to choose the right features. Improved Linear Discriminant Analysis (LDA) is utilized to choose the right features. The selected features are subjected to a Hybrid classifier for final detection. Here, models like CNN (Convolutional Neural Network) and Bi-GRU (Bidirectional Gated Recurrent Unit) are combined. A new Bernoulli Map Estimated Arithmetic Optimization Algorithm (BMEAOA) is added to train the system by adjusting the ideal weights of the two classifiers, leading to improved detection outcomes. Ultimately, the effectiveness is assessed in comparison to the other traditional techniques. © 2024 John Wiley & Sons Ltd.en_US
dc.language.isoenen_US
dc.publisherInternational Journal of Adaptive Control and Signal Processingen_US
dc.publisherJohn Wiley and Sons Ltden_US
dc.subjectCyber Physical Systemen_US
dc.subjectHybrid Classifieren_US
dc.subjectIntrusion Detectionen_US
dc.subjectOptimizationen_US
dc.titleHybrid Deep Architecture for Intrusion Detection In Cyber-Physical System: An Optimization-Based Approachen_US
dc.typeArticleen_US
Appears in Collections:Journal Articles

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.