DESIGN OF DEEP LEARNING MODELS FOR THE IDENTIFICATION OF HARMFUL ATTACK ACTIVITIES IN IIOT

Authors:

M.Sudhakar, Mohammed Abdul Kaif Ali, Thirumani manasa, bujji Asmitha, M Yogesh

Page No: 449-456

Abstract:

IICSs, which integrate technical systems with physical systems to provide services to businesses, have become a new area of study due to their susceptibility to cyber-attacks that could compromise their ability to continue providing services to businesses. For businesses, potential hazards result in revenue loss and reputational risk. Despite the factor protection against them, it is difficult to collect data for the purpose of building a wise NIDS that can effectively recognize both current and novel attacks

Description:

.

Volume & Issue

Volume-13,ISSUE-5

Keywords

.