Skip to main content

Intrusion Detection Through Gradient in Digraphs

  • Conference paper
  • First Online:
Advances in Security, Networks, and Internet of Things

Abstract

Unmanned autonomous vehicles (UAVs) driven by information obtained through sensor networks are believed to have a pivotal part in every area of life in the near future. In order to fulfil their objectives, the UAV will move through the data obtained by the associated network of sensors and of UAVs. The data includes heading to reach a destination, heading to hit a goal, the volume of the goal, and the min path to reach a destination. The accomplishment of such a task will be highly dependent upon the precision and legitimacy of any such data obtained on the ground. The significance of the data invites the adversary to interrupt the data collection network. The most shocking way to interrupt a data collection network is to insert malicious node(s) in the networks to contaminate the data and render it worthless. This sort of attacks upon networks are serious and quiet. Moreover, such attacks are straightforward to unveil as they need nominal resources from the adversary’s part. Gradient, level surfaces, and scalar fields are known concepts in thermodynamics and physics. This chapter extends these concepts to the networks. By using the extended concepts of gradients, level surfaces, and scalar point functions, this chapter provides a novel linear time algorithm to find the min path to a malicious node within a network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. W. Li, W. Meng, L.-F. Kwok, H.S. Horace, Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77, 135–145 (2017)

    Article  Google Scholar 

  2. C. Yin, Y. Zhu, J. Fei, X. He, A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)

    Article  Google Scholar 

  3. E. Hodo, X. Bellekens, A. Hamilton, P.-L. Dubouilh, E. Iorkyase, C. Tachtatzis, R. Atkinson, Threat analysis of IoT networks using artificial neural network intrusion detection system, in 2016 International Symposium on Networks, Computers and Communications (ISNCC), (IEEE, 2016), pp. 1–6

    Google Scholar 

  4. M.Z. Alom, V.R. Bontupalli, T.M. Taha, Intrusion detection using deep belief networks, in 2015 National Aerospace and Electronics Conference (NAECON), (IEEE, 2015), pp. 339–344

    Chapter  Google Scholar 

  5. W. Li, W. Meng, Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks. Inf. Comput. Secur 24, 265 (2016)

    Article  Google Scholar 

  6. M. Aurangzeb, F.L. Lewis, Internal structure of coalitions in competitive and altruistic graphical coalitional games. Automatica 50(2), 335–348 (2014)

    Article  MathSciNet  Google Scholar 

  7. F.L. Lewis, H. Zhang, K. Hengster-Movric, A. Das, Cooperative Control of Multi-Agent Systems: Optimal and Adaptive Design Approaches (Springer Science & Business Media, 2013)

    MATH  Google Scholar 

  8. C. Godsil, G.F. Royle, Algebraic Graph Theory, vol 207 (Springer Science & Business Media, 2013)

    MATH  Google Scholar 

  9. W.H. Hayt, Engineering Electromagnetics (McGraw-Hill Companies, 1974)

    Google Scholar 

  10. M.E. Gurtin, E. Fried, L. Anand, The Mechanics and Thermodynamics of Continua (Cambridge University Press, 2010)

    Book  Google Scholar 

  11. J.G. Proakis, Digital Signal Processing: Principles Algorithms and Applications (Pearson Education India, 2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mais Nijim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Varre, S.S., Aurangzeb, M., Nijim, M. (2021). Intrusion Detection Through Gradient in Digraphs. In: Daimi, K., Arabnia, H.R., Deligiannidis, L., Hwang, MS., Tinetti, F.G. (eds) Advances in Security, Networks, and Internet of Things. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-71017-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-71017-0_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-71016-3

  • Online ISBN: 978-3-030-71017-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics