-
Notifications
You must be signed in to change notification settings - Fork 1
/
threat.html
60 lines (49 loc) · 3.12 KB
/
threat.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
<!DOCTYPE HTML>
<html>
<head>
<title>Threat Analysis</title>
<link rel="shortcut icon" href="images/favicon.ico" type="image/x-icon">
<link rel="icon" href="images/favicon.ico" type="image/x-icon">
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=no" />
<link rel="stylesheet" href="assets/css/main.css" />
<noscript><link rel="stylesheet" href="assets/css/noscript.css" /></noscript>
</head>
<body class="is-preload">
<!-- Wrapper -->
<div id="wrapper">
<!-- Header -->
<header id="header">
<h1>Threat Analysis</h1>
<br>
</header>
<!-- Main -->
<div id="main">
<!-- Content -->
<section id="content" class="main">
<!-- <span class="image main"><img src="images/pic04.jpg" alt="" /></span> -->
<h2>Threat Algorithm</h2>
<p>Each sensor is given a different weight value based on how much of a threat the action triggering the sensor will create. The values are distributed so that the total sum for all of the sensors adds up to 10, which is the maximum threat level. Each sensor has its own threshold for detecting activity which determines whether or not it will be contributing to the overall threat score. Additionally, if the heartbeat of a certain node is not detected, meaning that an attacker has manually switched off the node, the sum of the threat weights of all the sensors in that node is added to the threat score. Finally, depending on the threat score, the user is notified of whether there is complete safety, potential activity, suspicious activity, or a critical threat. If the threat score reaches an index of 8 out of 10, the alarm and external encryption are triggered. </p>
<p>In order to prevent the threat level from immediately decreasing after an action is completed, such as opening a door and closing it right after, the algorithm uses the magnitude of the difference in the last 10 values from a given sensor to determine the rate of decay of that sensor's contribution to the overall threat score.</p>
</section>
<ul class="actions special">
<li><a href="index.html#threat" class="button primary">Return</a></li>
</ul>
<br>
</div>
<!-- Footer -->
<footer id="footer">
<p class="copyright" style="color:white"> An IoT Project by Ibiyemi Abiodun, Simon Abrelat, Sidhesh Desai, and Grace Pfohl</a>.</p>
<p class="copyright">© skiidk. Design based on Stellar by <a href="https://html5up.net">HTML5 UP</a>.</p>
</footer>
</div>
<!-- Scripts -->
<script src="assets/js/jquery.min.js"></script>
<script src="assets/js/jquery.scrollex.min.js"></script>
<script src="assets/js/jquery.scrolly.min.js"></script>
<script src="assets/js/browser.min.js"></script>
<script src="assets/js/breakpoints.min.js"></script>
<script src="assets/js/util.js"></script>
<script src="assets/js/main.js"></script>
</body>
</html>