Open Access Open Access  Restricted Access Subscription Access

Augmented Cyber-Physical Systems for Supply Chain 4.0 DDoS Attack Detection Deploying a TSO-DBN Deep Learning Approach Evaluation

Dr Pradeep Kumar Mallick

Abstract


Implementing robust detection methods is essential in the evolving realm of Supply Chain Risk Management 4.0, as cyber-physical systems (CPS) face increasing vulnerability to Distributed Denial of Service (DDoS) attacks. This paper introduces a cutting-edge approach to detecting DDoS attacks by integrating various artificial intelligence (AI) and data processing techniques.

The process begins with Z-score normalization for pre-processing, ensuring consistent feature scaling. Next, Principal Component Analysis (PCA) is used for dimensionality reduction while retaining significant variation. To enhance detection performance, we optimize the feature subset using Tunicate Swarm Optimization (TSO) for effective feature selection. These selected features are then utilized by a Deep Belief Network (DBN), a deep learning model, to classify anomalies. The DBN leverages learned patterns to distinguish between normal and attack scenarios.

To assess the effectiveness of the detection system, we evaluate performance indicators such as accuracy, precision, recall, and F1-score, ensuring the model's reliability. Additionally, the research examines the impact of various feature selection algorithms on the overall performance of the DDoS detection system to identify the most effective approach. This comprehensive strategy significantly enhances the resilience of cyber-physical systems against attacks, achieving a 99% success rate and improving the accuracy and reliability of DDoS detection in the dynamic landscape of Supply Chain Risk Management 4.0.


Full Text:

PDF

References


R. R. Pansara, S. A. Vaddadi, R. Vallabhaneni, N. Alam, B. Y. Khosla and P. Whig, "Fortifying Data Integrity using Holistic Approach to Master Data Management and Cybersecurity Safeguarding," 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 2024, pp. 1424-1428, doi: 10.23919/INDIACom61295.2024.10498671.

R. Vallabhaneni, N. H. S, H. P and S. S, "Protecting the Cybersecurity Network Using Lotus Effect Optimization Algorithm Based SDL Model," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-7, doi: 10.1109/ICDCOT61034.2024.10515812.

R. Vallabhaneni, N. H S, H. P and S. S, "Feature Selection Using COA with Modified Feedforward Neural Network for Prediction of Attacks in Cyber-Security," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-6, doi: 10.1109/ICDCOT61034.2024.10516044.

S. E. V. S. Pillai, R. Vallabhaneni, P. K. Pareek and S. Dontu, "Strengthening Cybersecurity using a Hybrid Classification Model with SCO Optimization for Enhanced Network Intrusion Detection System," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-9, doi: 10.1109/ICDCOT61034.2024.10516247.

R. Vallabhaneni, N. H. S, H. P and S. S, "Team Work Optimizer Based Bidirectional LSTM Model for Designing a Secure Cybersecurity Model," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-6, doi: 10.1109/ICDCOT61034.2024.10515495.

S. E. V. S. Pillai, R. Vallabhaneni, P. K. Pareek and S. Dontu, "The People Moods Analysing Using Tweets Data on Primary Things with the Help of Advanced Techniques," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-6, doi: 10.1109/ICDCOT61034.2024.10516073.

S. E. V. Somanathan Pillai, R. Vallabhaneni, P. K. Pareek and S. Dontu, "Financial Fraudulent Detection using Vortex Search Algorithm based Efficient 1DCNN Classification," 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), Bengaluru, India, 2024, pp. 1-6, doi: 10.1109/ICDCOT61034.2024.10515330.

VALLABHANENI, Rohith et al. Secured web application based on CapsuleNet and OWASP in the cloud. Indonesian Journal of Electrical Engineering and Computer Science, [S.l.], v. 35, n. 3, p. 1924-1932, sep. 2024. ISSN 2502-4760. doi:http://doi.org/10.11591/ijeecs.v35.i3.pp1924-1932.

Vallabhaneni,, Rohith et al. Detection of cyberattacks using bidirectional generative adversarial network. Indonesian Journal of Electrical Engineering and Computer Science, [S.l.], v. 35, n. 3, p. 1653-1660, sep. 2024. ISSN 2502-4760. doi:http://doi.org/10.11591/ijeecs.v35.i3.pp1653-1660.

Vallabhaneni,, Rohith et al. MobileNet based secured compliance through open web application security projects in cloud system. Indonesian Journal of Electrical Engineering and Computer Science, [S.l.], v. 35, n. 3, p. 1661-1669, sep. 2024. ISSN 2502-4760. doi:http://doi.org/10.11591/ijeecs.v35.i3.pp1661-1669.


Refbacks

  • There are currently no refbacks.