Research Article

Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks

Algorithm 2

Pseudo code for proposed the Entropy-based Extreme Learning Machine.
Step 1: Initialize training set
Activation function f(x); hidden node number L
Wj = 0; j = 1, 2, …, L; Wj random generation of hidden mode
Step 2: Calculate Entropy
; //bias value generation
Step 3:
Where;
   
Step 4: Calculate
H = (W1, W2, …, WL); (x1, x2, …, xN); (b1, b2, …, bL)
β = HTT; //output matrix determined
Step 5: Calculate actual output Sj
Step 6: γ = γ + D; //Direction of the features
Step 7: if x > Minxr(γ); //feature verified
EM = Rb(i); //Label function condition
End