Silencing Eavesdroppers: SVM Unveiling Physical Layer Threats

Poovarasan G.*, Vidhya Sri G.**, Singaravel G.***
*-*** Department of Information Technology, K. S. R College of Engineering, Tiruchengode, Tamilnadu, India.
Periodicity:January - March'2024
DOI : https://doi.org/10.26634/jit.13.1.20506

Abstract

Frothy Disturbance Intrusion Detection Systems (FIDS) can help detect and prevent security attacks using the Support Vector Machine (SVM) algorithm. Recognizing the importance of FIDS in protecting various domains linked to the internet, focus lies on adapting traditional intrusion detection methods for the landscape, which faces challenges such as resource constraints and limited memory and battery capacity. This study entails the creation of a lightweight attack detection technique that utilizes a supervised machine learning-based FIDS using the SVM algorithm. Simulations are used to demonstrate the usefulness of the proposed SVM-based FIDS classifier, which employs a combination of two or three complex features and achieves satisfactory classification accuracy and detection time. This strategy has the ability to enhance application security by effectively addressing the particular.

Keywords

Edge Computing, Frothy Disturbance, Distributed Systems, FIDS, SVM Algorithm, Security Attacks, Physical Layer Threats.

How to Cite this Article?

Poovarasan, G., Sri G. V., and Singaravel, G. (2024). Silencing Eavesdroppers: SVM Unveiling Physical Layer Threats. i-manager’s Journal on Information Technology, 13(1), 42-47. https://doi.org/10.26634/jit.13.1.20506

References

[9]. Hillel-Tuch, A. (2021). Data siphoning through advanced persistent transmission attacks at the physical layer. SSRN (pp. 1-4).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.