Affiliation:
1. Pranveer Singh Institute of Technology, India
2. Institute of Technology, Nirma University, India
Abstract
The rapid industrial growth in cyber-physical systems has led to upgradation of the traditional power grid into a network communication infrastructure. The benefits of integrating smart components have brought about security issues as attack perimeter has increased. In this chapter, firstly, the authors train the network on the results generated by the uncompromised grid network result dataset and then extract valuable features by the various system calls made by the kernel on the grid and after that internal operations being performed. Analyzing the metrics and predicting how the call lists are differing in call types, parameters being passed to the OS, the size of the system calls, and return values of the calls of both the systems and identifying benign devices from the compromised ones in the test bed are done. Predictions can be accurately made on the device behavior in the smart grid and calculating the efficiency of correct detection vs. false detection according to the confusion matrix, and finally, accuracy and F-score will be computed against successful anomaly detection behavior.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Anomaly Detectionin Network Traffic Scenarios by Resampling and Majority Voting with Concept Drift: A Hybrid Approach;2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO);2024-03-14
2. Fusion of blockchain and IoT in scientific publishing: Taxonomy, tools, and future directions;Future Generation Computer Systems;2023-05
3. Machine Learning Techniques for Anomaly Detection in Network Traffic;2021 Sixth International Conference on Image Information Processing (ICIIP);2021-11-26