Enhanced SCADA IDS Security by Using MSOM Hybrid Unsupervised Algorithm
نویسندگان
چکیده
In Self-Organizing Maps (SOM) are unsupervised neural networks that cluster high dimensional data and transform complex inputs into easily understandable inputs. To find the closest distance weight factor, it maps input space to low space. The Closest node point is denoted as a neuron. It classifies based on these neurons. reduction of dimensionality grid clustering using neurons makes observe similarities between data. our proposed Mutated Self Organizing (MSOM) approach, we have two intentions. One eliminate learning rate decrease neighborhood size next one out outliers in network. first by calculating median (MD) each with its neighbor nodes. Then those values compared another. case, if any MD significantly varies from rest then declared anomaly second phase, quantization error (QE) instance center.
منابع مشابه
Enhanced Security using Hybrid Encryption Algorithm
Information Security plays a major role in today’s scenario. Cloud computing is a technology that provides access to information and computing resources from anywhere that a network is available. There is a need to secure the data stored on cloud. The main goal behind the design of encryption algorithm must be security against unauthorized attacks. However, for all cloud computing applications,...
متن کاملEnhanced Security Mechanism in Cloud Computing Using Hybrid Encryption Algorithm and Fragmentation: a Review
Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the schematic diagrams. It represents all the complexities of the network which may include everything from cables, routers, servers, data centers and all such other devices. Cloud b...
متن کاملConnecting SCADA Systems to Corporate IT Networks Using Security-Enhanced Linux
Substation networks have traditionally been isolated from corporate Information Technology (IT) networks. Hence, the security of substation networks has depended heavily upon limited access points and the use of point-to-point Supervisory Control and Data Acquisition (SCADA) specific protocols. With the introduction of Ethernet into substations, pressure to reduce expenses and provide Internet ...
متن کاملCyber Security of Water SCADA Systems: (II) Attack Detection using Enhanced Hydrodynamic Models
This article investigates the problem of detection and isolation of attacks on a water distribution network comprised of cascaded canal pools. The proposed approach employs a bank of delay-differential observer systems. The observers are based on an analytically approximate model of canal hydrodynamics. Each observer is insensitive to one fault/attack mode and sensitive to other modes. Design o...
متن کاملEnhanced Security for Cloud Storage using Hybrid Encryption
In the cloud environment, resources are shared among all of the servers, users and individuals. So it is difficult for the cloud provider to ensure file security. As a result it is very easy for an intruder to access, misuse and destroy the original form of data. In case of compromise at any cost; entrusting cloud is of no use. A need for “practically strong and infeasible to get attacked” tech...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Web-based Learning and Teaching Technologies
سال: 2022
ISSN: ['1548-1107', '1548-1093']
DOI: https://doi.org/10.4018/ijwltt.20220301.oa2