Research Article
Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks
Algorithm 2
Pseudo code for proposed the Entropy-based Extreme Learning Machine.
| Step 1: Initialize training set | | Activation function f(x); hidden node number L | | Wj = 0; j = 1, 2, …, L; Wj random generation of hidden mode | | Step 2: Calculate Entropy | | ; //bias value generation | | Step 3: | | Where; | | | | Step 4: Calculate | | H = (W1, W2, …, WL); (x1, x2, …, xN); (b1, b2, …, bL) | | β = HTT; //output matrix determined | | Step 5: Calculate actual output Sj | | | | Step 6: γ = γ + D; //Direction of the features | | | | Step 7: if x > Minxr(γ); //feature verified | | EM = Rb(i); //Label function condition | | End |
|