Research Article
Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks
Algorithm 1
Pseudo code of proposed Modified Grey Wolf Optimization.
| Index N number of features | | FN = (F1, F2, …, FN) | | Step 1: Initialize ‘n’ population size | | | | Set t = 0; //preliminary value | | r = 1; //radius initialized | | Step 2: Approximate cost functional value as Cov | | | | Where, | | Step 3: set i = 1 | | While (i ≤ n) do | | ; //Random generation | | | | Step 4: Select | | Step 5: Updating phase | | | | | | Position is updated | | ; update radius | | | | Step 6: for i = 1 to N; //Iterations undertaken | | | | | | Step 7: | | | | ; //cross over mutation | | Where; | | | | | | Update weight of selected features | | End |
|