
This system identifies the intruders who enter into the system without proper access. In a huge network system like SCADA, the role of Intrusion Detection is vital in detecting the anonymous users. In a security domain, the main challenge is to identify the intruder activities.

The classified results of the proposed method for testing SCADA dataset are analysed and the performance metrics are evaluated and compared with the state‐of‐the‐art methods. The classification process is performed by the Boltzmann machine learning algorithm. Then, from that optimally selected clustered data, the relevancy vector is predicted and the types are classified. In this optimisation process, the flora seeds are selected genetically to select best features. From that clustered data, the features that are irrelevant for classification process is identified and suppressed by using the genetically seeded flora optimisation algorithm. This clustering of data is performed by mean‐shift clustering algorithm. These cluster forms the initial processing of attack identification which prevents the mismatched result. In this, the features are labelled and cluster between the matrixes are extracted. The attack types are classified by the optimal selection of features extracted from the sensor data. This study discusses about the attack prediction and classification process by using an enhanced model of machine learning technology.


The controlling of these network is specified by supervisory control and data acquisition (SCADA) systems. The applications such as the remote communication and the control system are in critically integrated arrangement.
