Research Article

Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks

Algorithm 1

Pseudo code of proposed Modified Grey Wolf Optimization.
Index N number of features
FN = (F1, F2, …, FN)
Step 1: Initialize ‘n’ population size
Set t = 0; //preliminary value
r = 1; //radius initialized
Step 2: Approximate cost functional value as Cov
Where,
Step 3: set i = 1
While (i ≤ n) do
; //Random generation
Step 4: Select
Step 5: Updating phase
Position is updated
; update radius
Step 6: for i = 1 to N; //Iterations undertaken
Step 7:
; //cross over mutation
Where;
Update weight of selected features
End