Repository for research conducted at NETX, a networks research group in the Department of Computer Science and Engineering at IIT Hyderabad, India led by Dr. Praveen Tammana.
Question: With the set of thresholds and contamination parameters taken from plots 2, are we able to detect the attack before the attack is successful?
Objective: To showcase the time gap between the time of detection by our system and the time of the success of the attack
Details:
This is a bar graph with 2 bars per attack experiment.
The first bar denotes the time of attack success
The second bar denotes the time for attack detection
X-axis: Attack experiments #1, #2, #3..
Y-axis: Time (in secs)
Question: With the set of thresholds and contamination parameters taken from plots 2, are we able to detect the attack before the attack is successful?
Objective: To showcase the time gap between the time of detection by our system and the time of the success of the attack
Details:
X-axis: Attack experiments #1, #2, #3.. Y-axis: Time (in secs)