GAN Base feedback analysis system for industrial IOT networks

被引:13
作者
Ashok, K. [1 ]
Boddu, Rajasekhar [2 ]
Syed, Salman Ali [3 ]
Sonawane, Vijay R. [4 ]
Dabhade, Ravindra G. [5 ]
Reddy, Pundru Chandra Shaker [6 ]
机构
[1] New Horizon Coll Engn, Dept Comp Sci & Engn, Bangalore, India
[2] Haramaya Univ, Dept Software Engn, Coll Comp & Informat, Dire Dawa, Ethiopia
[3] Jouf Univ, Dept Comp Sci, Appl Coll, Tabarjal, Saudi Arabia
[4] MVPSs Karmaveer AdvBaburao Ganpatrao Thakare Coll, Dept Informat Technol, Nasik, India
[5] Matoshri Coll Engn & Res Ctr, Dept Elect & Telecommunicat Engn, Nasik, India
[6] REVA Univ, Sch Comp & Informat Technol, Bangalore, India
关键词
Denial-of-Service; cyber-physical production systems (CPPS); cognitive feedback; generative adversarial networks (GANs); RESILIENT CONTROL; INTERNET; DESIGN; SDN;
D O I
10.1080/00051144.2022.2140391
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The internet, like automated tools, has grown to better our daily lives. Interacting IoT products and cyber-physical systems. Generative Adversarial Network's (GANs') generator and discriminator may have different inputs, allowing feedback in supervised models. AI systems use neural networks, and adversarial networks analyse neural network feedback. Cyber-physical production systems (CPPS) herald intelligent manufacturing . CPPS may launch cross-domain attacks since the virtual and real worlds are interwoven. This project addresses enhanced Cyber-Physical System(CPS) feedback structure for Denial-of-Service (DoS) defence . Comparing sensor-controller and controller-to-actuator DoS attack channels shows a swapping system modelling solution for the CPS's complex response feedback. Because of the differential in bandwidth between the two channels and the suspects' limited energy, one person can only launch so many DoS assaults. DoS attacks are old and widespread. Create a layered switching paradigm that employs packet-based transfer techniques to prevent assaults. The discriminator's probability may be used to assess whether feedback samples came from real or fictional data. Cognitive feedback can assess GA feedback data.
引用
收藏
页码:259 / 267
页数:9
相关论文
共 37 条
[1]  
Al-Qaseemi SA, 2016, PROCEEDINGS OF 2016 FUTURE TECHNOLOGIES CONFERENCE (FTC), P731, DOI 10.1109/FTC.2016.7821686
[2]   Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques [J].
AlZubi, Ahmad Ali ;
Al-Maitah, Mohammed ;
Alarifi, Abdulaziz .
SOFT COMPUTING, 2021, 25 (18) :12319-12332
[3]   Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (08) :2596-2603
[4]   Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies [J].
Befekadu, Getachew K. ;
Gupta, Vijay ;
Antsaklis, Panos J. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (12) :3299-3304
[5]   SDN and Virtualization Solutions for the Internet of Things:A Survey [J].
Bizanis, Nikos ;
Kuipers, Fernando A. .
IEEE ACCESS, 2016, 4 :5591-5606
[6]  
Cardenas S., 2009, WORKSHOP FUTURE DIRE
[7]   A Further Study on Output Feedback H∞ Control for Discrete-Time Systems [J].
Chang, Xiao-Heng ;
Liu, Rong-Rong ;
Park, Ju H. .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (02) :305-309
[8]   KCAD: Kinetic Cyber-Attack Detection Method for Cyber-Physical Additive Manufacturing Systems [J].
Chhetri, Sujit Rokka ;
Canedo, Arquimedes ;
Al Faruque, Mohammad Abdullah .
2016 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2016,
[9]   Resilient control under Denial-of-Service: Robust design [J].
Feng, Shuai ;
Tesi, Pietro .
AUTOMATICA, 2017, 79 :42-51
[10]   Distributed networked control systems: A brief overview [J].
Ge, Xiaohua ;
Yang, Fuwen ;
Han, Qing-Long .
INFORMATION SCIENCES, 2017, 380 :117-131