• An intruder defense model for the detection of power grid disturbances in wireless network

    • Fulltext

       

        Click here to view fulltext PDF


      Permanent link:
      https://www.ias.ac.in/article/fulltext/sadh/045/0154

    • Keywords

       

      Network security; conviction; intrusion detection; cyber security; encryption; supervisory control And Data Acquisition.

    • Abstract

       

      Cyber security has to gain a high level of awareness in the Network and Computer pasture due to the large spread of information transmission technology. A powerful False Data Injection (FDI) Intruder monitors the network activities and injects the malicious data thereby causing failure in the power system. To overcome this defense, the ‘‘Conviction based Intruder Defense Model’’ is proposed to identify and isolate it from the network by providing secure transmission. This scheme operates in three phases. In the first phase, thedata are analyzed with the library files to identify the conviction values. Based on the conviction values the resulting factors are analyzed with different iterations and the suspicious drafts are identified and classified using Fuzzy Intrusion Detection System (FIDS) divider. In the second phase, three algorithms are used to organize the drafts categorized. In the third phase, abnormal nodes are isolated from the network. Experimental results show higher accuracy and detection rates with low false positives.

    • Author Affiliations

       

      R B BENISHA1 S RAJA RATNA

      1. Department of Computer Science and Engineering, V V College of Engineering, Tisaiyanvilai, India
    • Dates

       
  • Sadhana | News

    • Editorial Note on Continuous Article Publication

      Posted on July 25, 2019

      Click here for Editorial Note on CAP Mode

© 2021-2022 Indian Academy of Sciences, Bengaluru.