Detection of Web based-Attacks Using Artificial Intelligence

Authors

  • Y Rajesh  Assistant Professor, Department of Computer Science and Engineering, ALIET, Vijayawada, India
  • Ch. SivaKrishna  UG Scholar, Department of Computer Science and Engineering, ALIET, Vijayawada, India
  • B. Jaswanth  UG Scholar, Department of Computer Science and Engineering, ALIET, Vijayawada, India
  • J. SriHarsha  UG Scholar, Department of Computer Science and Engineering, ALIET, Vijayawada, India

Keywords:

CPS, Cyber-Attacks, Cyber-Physical Systems

Abstract

The cyber-physical systems (cps) have improved significantly in many dynamic applications. Yet, these systems are seriously threatened by cyberattacks. Cyber-attacks, in contrast to flaws that result from errors in cyber-physical systems, are premeditated and covert. Some of these assaults, also known as deception attacks, manipulate certain cyber components or introduce phoney data from sensors or controllers into the system to damage data or introduce misleading information. Inability to recognise these attacks if the system is not aware of them could cause performance issues or even total system failure. To identify these attacks in these systems, algorithms must be altered.It should be mentioned that since the data generated by these systems is produced in such vast quantities, with such a broad diversity, and at such a quick rate, the application of machine learning algorithms is needed to make it easier to analyse, appraise, and uncover hidden patterns in the data. The CPS is modelled in this study as a network of moving agents, one of which acts as the leader and the rest of which are submissive to it. The approach proposed in this study makes advantage of the deep neural network's structural features for the detection stage, which ought to alert the system to the attack's presence in its first stages. In a leader-follower mechanism, to isolate the problematic agent, The application of resilient control methods in a network has been researched. The control system in the previously discussed control approach use a deep neural network to identify an attack before isolating the attacking agent and then isolating the misbehaving agent using a reputation mechanism. Experimental investigations have shown that deep learning algorithms may identify assaults more precisely than traditional techniques, as well as simplify, be proactive, cost-effective, and greatly enhance cyber security.

References

  1. Kwon, Cheolhyeon, Weiyi Liu, and Inseok Hwang. ”Security analysis for cyber-physical systems against stealthy deception attacks.” In 2013 American control conference, IEEE (2013): 3344-3349.
  2. Pajic, Miroslav, James Weimer, Nicola Bezzo, Oleg Sokolsky, George J. Pappas, and Insup Lee. ”Design and implementation of attack-resilient cyberphysical systems: With a focus on attack-resilient state estimators.” IEEE Control Systems Magazine 37, no. 2 (2017): 66-81.
  3. Sheng, Long, Ya-Jun Pan, and Xiang Gong. ”Consensus formation control for a class of networked multiple mobile robot systems.” Journal of Control Science and Engineering 2012 (2012).
  4. Zeng, Wente, and Mo-Yuen Chow. ”Resilient distributed control in the presence of misbehaving agents in networked control systems.” IEEE transactions on cybernetics 44, no. 11 (2014): 2038-2049.
  5. Sun, Hongtao, Chen Peng, Taicheng Yang, Hao Zhang, and Wangli He. ”Resilient control of networked control systems with stochastic denial of service attacks.” Neurocomputing 270 (2017): 170-177.
  6. Zhang, Haotian, and Shreyas Sundaram. ”Robustness of information diffusion algorithms to locally bounded adversaries.” In 2012 American Control Conference (ACC), IEEE (2012): 5855-5861.
  7. Fu, Weiming, Jiahu Qin, Yang Shi, Wei Xing Zheng, and Yu Kang. ”Resilient Consensus of Discrete-Time Complex Cyber-Physical Networks under Deception Attacks.” IEEE Transactions on Industrial Informatics (2019).
  8. Ozay, Mete, InakiEsnaola, Fatos Tunay YarmanVural, Sanjeev R. Kulkarni, and H. Vincent Poor. ”Machine learning methods for attack detection in the smart grid.” IEEE transactions on neural networks and learning systems 27, no. 8 (2015): 1773-1786.
  9. Tianfield, Huaglory. ”Data mining based cyber-attack detection.” System simulation technology 13, no. 2 (2017): 90-104.
  10. Pasqualetti, Fabio, Florian Dorfler, and Francesco Bullo. ”Attack detection and ¨ identification in cyber-physical systems.” IEEE Transactions on Automatic Control 58, no. 11 (2013): 2715-2729.

Downloads

Published

2023-04-30

Issue

Section

Research Articles

How to Cite

[1]
Y Rajesh, Ch. SivaKrishna, B. Jaswanth, J. SriHarsha, " Detection of Web based-Attacks Using Artificial Intelligence, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 2, pp.403-417, March-April-2023.