Using machine learning models to detect DDOS attacks in theinfrastructure of nuclear power plants

Publish Year: 1402
نوع سند: مقاله کنفرانسی
زبان: English
View: 55

This Paper With 5 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ICTBC07_003

تاریخ نمایه سازی: 26 اسفند 1402

Abstract:

The structure of nuclear power shops is a critical element of our energy systems, and icing its security is of utmostsignificance. Distributed Denial of Service (DDoS) attacks pose significant trouble to these architectures, as they candisrupt operations and concession safety. To alleviate similar pitfalls, this exploration proposes the use of machineliteracy models to descry and help DDoS attacks in nuclear power factory structures. The proposed approachinvolves collecting a comprehensive dataset of network business data from nuclear power factory architectures,including both normal business patterns and colorful types of DDoS attacks. Applicable features are uprooted fromthe collected data, similar to packet size, rate, protocol types, and business anomalies. These features are alsopreprocessed and regularized to ensure thickness and equal significance. Machine literacy algorithms, similar toRandom Forest, Support Vector Machines (SVM), or Neural Networks, are employed to train models using thepreprocessed dataset. The trained models are estimated using standard criteria, including delicacy, perfection, recall,and F۱- score, to assess their performance. Real-time monitoring systems are stationed to continuously dissectnetwork business and descry any suspicious patterns reflective of an implicit DDoS attack. Once a DDoS attack isdetected, the system triggers applicable response and mitigation strategies, similar to blocking or reroutingsuspicious business, notifying the security labor force, or cranking fresh security measures. The proposed frame alsoemphasizes nonstop enhancement, with models being regularly streamlined and retrained with new data toacclimatize to arising attack patterns.

Authors

Morteza Ghorbani

Department of engineering, School of Mechanical Engineering, College of Engineering,Islamic Azad university of Mashhad

saeed amini

Islamic Azad University, Science and Research Unit, Faculty of Electrical and ComputerScience, Tehran

Hamed garoosi

Ph.D. student in Electrical Engineering - Telecommunication (Wave), Babol Noshirvani University of Technology