Volume 20 No 9 (2022)
 Download PDF
IoT- Enabled Cyber Physical Systems detection approaches and distribution of cyber attacks
Dr.R.J Venkatesh, N.Juliet , Dr. A. Nalini, Dr E. Sheeba Percis , Satyajit Sidheshwar Uparkar, Priti C Golar
Abstract
Protecting IoT-enabled cyber-physical systems (CPS) can always be a problem because authentication mechanisms designed for standard information / operational technology systems do not succeed in CPS environments. As a result, the study adopted a cyber-intensive detection mechanism and identification method using CPS with an emphasis on control systems. These proposed attack detection and identification systems provide the basis for maintaining the security of CPS IoT systems. This methodology is provided to address the problem of CPS IoT data imbalances without ignoring minority classes or trying to balance the data. The proposed framework should be placed at the top of the protocol stack in order to passively analyse sensor information and issue an alert when an attack occurs. This data is provided to the attribution model for this scenario to detect the attacker's capabilities. In addition, by leveraging the timely and productive data of the proposed platform, security researchers, including emergency response teams, can respond to attacks and avoid potential losses. The detection and prevention steps use deeper representations to learn how to transform data into faster dimensions, but use DTs to identify attack data. The privacy of IoT devices, including these critical assets, is a major concern. IoT connections are another reason that are primarily generated through critical infrastructure. As a result, IoT vulnerabilities have a significant impact on the environment in which they are used. With the IoT, users and service providers will pay more attention to privacy and anonymity. This research paper proposes an innovative IoT-based cyber-physical system that uses two different methods of detection and distribution in cyber-attacks.
Keywords
Cyber Physical System, Internet-of-Things, Detection, Distribution, IoT Vulnerabilities
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.