Intrusion Detection in Cyber Physical Systems Using Multichain

Intrusion Detection in Cyber Physical Systems Using Multichain

ISBN13: 9781668486665|ISBN10: 1668486660|ISBN13 Softcover: 9781668486672|EISBN13: 9781668486689
DOI: 10.4018/978-1-6684-8666-5.ch009
Cite Chapter Cite Chapter

MLA

Nalayini, C. M., et al. "Intrusion Detection in Cyber Physical Systems Using Multichain." Malware Analysis and Intrusion Detection in Cyber-Physical Systems, edited by S.L. Shiva Darshan, et al., IGI Global, 2023, pp. 189-214. https://doi.org/10.4018/978-1-6684-8666-5.ch009

APA

Nalayini, C. M., Katiravan, J., & Sathya, V. (2023). Intrusion Detection in Cyber Physical Systems Using Multichain. In S. Shiva Darshan, M. Manoj Kumar, B. Prashanth, & Y. Vishnu Srinivasa Murthy (Eds.), Malware Analysis and Intrusion Detection in Cyber-Physical Systems (pp. 189-214). IGI Global. https://doi.org/10.4018/978-1-6684-8666-5.ch009

Chicago

Nalayini, C. M., Jeevaa Katiravan, and V. Sathya. "Intrusion Detection in Cyber Physical Systems Using Multichain." In Malware Analysis and Intrusion Detection in Cyber-Physical Systems, edited by S.L. Shiva Darshan, et al., 189-214. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-8666-5.ch009

Export Reference

Mendeley
Favorite

Abstract

Distributed denial of service attack is a kind of cyber smack. Though this attack is known by everyone, its severity is increasing day by day. It denies the services of the network or online services by flooding with unwanted data and makes things unavailable. The impact of DDoS is very high, always. Recently, Twitter, Spotify, Amazon, and Paypal were severely affected by this DDoS. This made the services unavailable to their customers. Blockchain is one of the trending technology can be used to find the misbehaving nodes alias bots from the peer to peer networks. Due to lack of interoperability in blockchain, Multichain is proposed in this chapter to detect DDoS attacks along with cross chain technology. It is designed to communicate with multiple networks and the cross chain technology is built to have the flow between the different chains using smart contract. Deep learning models such as CNN and LSTM are trained and tested with CICDDOS2019 dataset and selected LSTM as the best model and installed at Multichain for detecting the malicious activity and blacklisting it immediately.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.