Adaptive Hierarchical Cyber Attack Detection and Localization in Active Distribution

Main Article Content

Vanapamula Veerabrahmachari
Arekatla Madhava Reddy
Dr. G. Samba Siva Rao
Dr. Padigala Suresh

Abstract

Unlike dangers such as radioactivity that have always been a part of space travel, a malevolent and enduring threat can change over time. As a result, conventional systems engineering methods and models may need to be extended or modified to successfully handle the more dynamic behavior and uncertainty of modern mission systems.intelligence-based features of one's opponent. This document details the implementation of a typical espionage assault against mission systems that have been "secured" in the conventional sense, such as by being in accordance with the standard IT Security Plan. By analyzing a real-world assault in the context of a task, we were able to pinpoint the most pressing issues in need of systems engineering attention moving forward. In particular, initiatives that seek to fortify mission systems against the online enemy. In brief, the basic espionage example given here shows how a group of "secure" computers can be constructed into an unsecure system, highlighting the need to investigate cyber-defensive testing infrastructure, methods, and toolkits, as well as the ways in which these can be connected to testing objectives.

Article Details

Section
Articles