Abstract
Unmanned autonomous vehicles (UAVs) driven by information obtained through sensor networks are believed to have a pivotal part in every area of life in the near future. In order to fulfil their objectives, the UAV will move through the data obtained by the associated network of sensors and of UAVs. The data includes heading to reach a destination, heading to hit a goal, the volume of the goal, and the min path to reach a destination. The accomplishment of such a task will be highly dependent upon the precision and legitimacy of any such data obtained on the ground. The significance of the data invites the adversary to interrupt the data collection network. The most shocking way to interrupt a data collection network is to insert malicious node(s) in the networks to contaminate the data and render it worthless. This sort of attacks upon networks are serious and quiet. Moreover, such attacks are straightforward to unveil as they need nominal resources from the adversary’s part. Gradient, level surfaces, and scalar fields are known concepts in thermodynamics and physics. This chapter extends these concepts to the networks. By using the extended concepts of gradients, level surfaces, and scalar point functions, this chapter provides a novel linear time algorithm to find the min path to a malicious node within a network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
W. Li, W. Meng, L.-F. Kwok, H.S. Horace, Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77, 135–145 (2017)
C. Yin, Y. Zhu, J. Fei, X. He, A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954–21961 (2017)
E. Hodo, X. Bellekens, A. Hamilton, P.-L. Dubouilh, E. Iorkyase, C. Tachtatzis, R. Atkinson, Threat analysis of IoT networks using artificial neural network intrusion detection system, in 2016 International Symposium on Networks, Computers and Communications (ISNCC), (IEEE, 2016), pp. 1–6
M.Z. Alom, V.R. Bontupalli, T.M. Taha, Intrusion detection using deep belief networks, in 2015 National Aerospace and Electronics Conference (NAECON), (IEEE, 2015), pp. 339–344
W. Li, W. Meng, Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks. Inf. Comput. Secur 24, 265 (2016)
M. Aurangzeb, F.L. Lewis, Internal structure of coalitions in competitive and altruistic graphical coalitional games. Automatica 50(2), 335–348 (2014)
F.L. Lewis, H. Zhang, K. Hengster-Movric, A. Das, Cooperative Control of Multi-Agent Systems: Optimal and Adaptive Design Approaches (Springer Science & Business Media, 2013)
C. Godsil, G.F. Royle, Algebraic Graph Theory, vol 207 (Springer Science & Business Media, 2013)
W.H. Hayt, Engineering Electromagnetics (McGraw-Hill Companies, 1974)
M.E. Gurtin, E. Fried, L. Anand, The Mechanics and Thermodynamics of Continua (Cambridge University Press, 2010)
J.G. Proakis, Digital Signal Processing: Principles Algorithms and Applications (Pearson Education India, 2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Varre, S.S., Aurangzeb, M., Nijim, M. (2021). Intrusion Detection Through Gradient in Digraphs. In: Daimi, K., Arabnia, H.R., Deligiannidis, L., Hwang, MS., Tinetti, F.G. (eds) Advances in Security, Networks, and Internet of Things. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-71017-0_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-71017-0_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-71016-3
Online ISBN: 978-3-030-71017-0
eBook Packages: EngineeringEngineering (R0)