Volume 20 No 9 (2022)
Download PDF
IoT- Enabled Cyber Physical Systems detection approaches and distribution of cyber attacks
Dr.R.J Venkatesh, N.Juliet , Dr. A. Nalini, Dr E. Sheeba Percis , Satyajit Sidheshwar Uparkar, Priti C Golar
Abstract
Protecting IoT-enabled cyber-physical systems (CPS) can always be a problem because authentication
mechanisms designed for standard information / operational technology systems do not succeed in CPS
environments. As a result, the study adopted a cyber-intensive detection mechanism and identification
method using CPS with an emphasis on control systems. These proposed attack detection and
identification systems provide the basis for maintaining the security of CPS IoT systems. This
methodology is provided to address the problem of CPS IoT data imbalances without ignoring minority
classes or trying to balance the data. The proposed framework should be placed at the top of the
protocol stack in order to passively analyse sensor information and issue an alert when an attack
occurs. This data is provided to the attribution model for this scenario to detect the attacker's
capabilities. In addition, by leveraging the timely and productive data of the proposed platform, security
researchers, including emergency response teams, can respond to attacks and avoid potential losses.
The detection and prevention steps use deeper representations to learn how to transform data into
faster dimensions, but use DTs to identify attack data. The privacy of IoT devices, including these critical
assets, is a major concern. IoT connections are another reason that are primarily generated through
critical infrastructure. As a result, IoT vulnerabilities have a significant impact on the environment in
which they are used. With the IoT, users and service providers will pay more attention to privacy and
anonymity. This research paper proposes an innovative IoT-based cyber-physical system that uses two
different methods of detection and distribution in cyber-attacks.
Keywords
Cyber Physical System, Internet-of-Things, Detection, Distribution, IoT Vulnerabilities
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.