DESIGN OF DEEP LEARNING MODELS FOR THE IDENTIFICATION OF HARMFUL ATTACK ACTIVITIES IN IIOT
Authors:
M.Sudhakar, Mohammed Abdul Kaif Ali, Thirumani manasa, bujji Asmitha, M Yogesh
Page No: 449-456
Abstract:
IICSs, which integrate technical systems with physical systems to provide services to businesses, have become a new area of study due to their susceptibility to cyber-attacks that could compromise their ability to continue providing services to businesses. For businesses, potential hazards result in revenue loss and reputational risk. Despite the factor protection against them, it is difficult to collect data for the purpose of building a wise NIDS that can effectively recognize both current and novel attacks
Description:
.
Volume & Issue
Volume-13,ISSUE-5
Keywords
.