2,981 Hits in 5.0 sec

Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation

Gauthama Raman M. R., Chuadhry Mujeeb Ahmed, Aditya Mathur
2021 Cybersecurity  
The use of these approaches leads to relatively easier and faster creation of anomaly detectors compared to the use of design-centric approaches that are based on plant physics and design.  ...  Towards this end, a class of anomaly detectors, created using data-centric approaches, are gaining attention.  ...  NRF2016NCR-NCR002-023 and NRF2018NCR-NSOE005-0001) and administered by the National Cybersecurity R&D Directorate. 1 iTrust, Singapore University of Technology and Design (SUTD)  ... 
doi:10.1186/s42400-021-00095-5 fatcat:fr4h45z5zzhsfod4z663iildl4

Cyber-Physical Security of an Electric Microgrid

Prashanth Palaniswamy, Bruce McMillin
2018 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)  
Invariants are manually generated using the insights obtained through MSDND analysis and use linear regression to automate the generation of invariants.  ...  Limitations of the design and successes/shortcomings of attack mitigation are reported. iv ACKNOWLEDGMENTS First and foremost, I would like to express my reverence and gratitude to my advisor and professional  ...  In this document, we examine the general security concerns of an electric grid through a testbed instantiation using Design-centric approach (DeC) and Data-centric approach (DaC).  ... 
doi:10.1109/prdc.2018.00018 dblp:conf/prdc/PalaniswamyM18 fatcat:myoathbambbj7fpa3vt3ckoim4

Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?

Sampath Kumar Venkatachary, Annamalai Alagappan, Leo John Baptist Andrews
2021 Energy Informatics  
AbstractDistributed generators (D.G.'s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants.  ...  This paper aims to present a comprehensive Edge-based security architecture to help reduce the risks and help secure the physical systems and ensure privacy and data protection.  ...  Buczak et al. present a survey on using data mining and machine learning techniques as methods for intrusion detection. (Buczak & Guven, 2016) .  ... 
doi:10.1186/s42162-021-00139-7 pmid:35224445 pmcid:PMC8010494 fatcat:x6r4viitbfekndinlbbhkujhne

Enhanced Position Verification for VANETs using Subjective Logic [article]

Rens W. van der Heijden and Ala'a Al-Momani and Frank Kargl and Osama M.F. Abu-Sharkh
2017 arXiv   pre-print
A more general approach to validate such information is by applying misbehavior detection mechanisms.  ...  In this paper, we consider misbehavior detection by enhancing two position verification mechanisms and fusing their results in a generalized framework using subjective logic.  ...  ACKNOWLEDGMENT This work was performed on the computational resource bwUniCluster funded by the Ministry of Science, Research and the Arts Baden-Württemberg and the Universities of the State of Baden-Württemberg  ... 
arXiv:1703.10399v1 fatcat:4agwkpitvbfhvcmsrywwn5yxma

Enhanced Position Verification for VANETs Using Subjective Logic

Rens W. van der Heijden, Ala'a Al-Momani, Frank Kargl, Osama M. F. Abu-Sharkh
2016 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall)  
A more general approach to validate such information is by applying misbehavior detection mechanisms.  ...  In this paper, we consider misbehavior detection by enhancing two position verification mechanisms and fusing their results in a generalized framework using subjective logic.  ...  ACKNOWLEDGMENT This work was performed on the computational resource bwUniCluster funded by the Ministry of Science, Research and the Arts Baden-Württemberg and the Universities of the State of Baden-Württemberg  ... 
doi:10.1109/vtcfall.2016.7881000 dblp:conf/vtc/HeijdenAKA16 fatcat:qahyceirujc63cbavm2bs3vjoq

Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems

Rens W. van der Heijden, Stefan Dietzel, Tim Leinmuller, Frank Kargl
2018 IEEE Communications Surveys and Tutorials  
However, because attackers can be insiders within the network (i.e., possess valid key material), this approach cannot detect all possible attacks.  ...  In this survey, we present misbehavior detection mechanisms that can detect such insider attacks based on attacker behavior and information analysis.  ...  Acknowledgements We thank Anke Jentzsch and Hendrik Decke from Volkswagen AG, Germany, for their cooperation, feedback and fruitful discussions concerning this survey.  ... 
doi:10.1109/comst.2018.2873088 fatcat:obf72ruawrgwrpqe2vizcsbqtm

Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning [article]

Muhammad Azmi Umer, Chuadhry Mujeeb Ahmed, Muhammad Taha Jilani, Aditya P. Mathur
2021 arXiv   pre-print
Automatically generated attacks improve our understanding of the potential attacks and enable the design of robust attack detection techniques.  ...  Adversarial learning is used to test the robustness of machine learning algorithms under attack and create attacks that deceive the anomaly detection methods in Industrial Control System (ICS).  ...  EVALUATION AND DISCUSSION To validate the generated attack patterns, we replicated the experiments performed in [21] using the data-centric approach.  ... 
arXiv:2107.05127v1 fatcat:zytttpycwbfwvptxfurzzqhlzu

Deriving invariant checkers for critical infrastructure using axiomatic design principles

Cheah Huei Yoong, Venkata Reddy Palleti, Rajib Ranjan Maiti, Arlindo Silva, Christopher M Poskitt
2021 Cybersecurity  
Many approaches for identifying invariants attempt to do so automatically, typically using data logs, but these can miss valid system properties if relevant behaviours are not well-represented in the data  ...  We apply our method to the designs of two CPS testbeds, SWaT and WADI, deriving a suite of invariant checkers that are able to detect a variety of single- and multi-stage attacks without any false positives  ...  Availability of data and materials The datasets used in this research are available online (iTrust Labs: Datasets 2020).  ... 
doi:10.1186/s42400-021-00069-7 fatcat:ck7trtf4pvgrdjc3vorufmdes4

Cascading effects of cyber-attacks on interconnected critical infrastructure

Venkata Reddy Palleti, Sridhar Adepu, Vishrut Kumar Mishra, Aditya Mathur
2021 Cybersecurity  
One source of complexity in such systems is due to the intra-system interactions and inter-dependencies. Consequently, these systems are a potential target for attackers.  ...  In this paper, we report a study to investigate the cascading effects of cyber-attacks on two interdependent critical infrastructure namely, a Secure water treatment plant (SWaT) and a Water Distribution  ...  VKM and AM provided technical feedback throughout the work. All authors reviewed the final manuscript. All authors read and approved the final manuscript.  ... 
doi:10.1186/s42400-021-00071-z fatcat:7hfbociyovcshbb5xhjsmrgb6q

Modelling cyber security for software-defined networks those grow strong when exposed to threats

Usama Ahmed, Imran Raza, Syed Asad Hussain, Amjad Ali, Muddesar Iqbal, Xinheng Wang
2015 Journal of Reliable Intelligent Environments  
Second, it advocates the necessity and introduces a novel approach of antifragile cyber security within SDN paradigm and finally it proposes a unified model for integrating both approaches of "Security  ...  Both these perspectives of "Security with SDN" and "Security for SDN" have invited research and innovations, yet both these approaches remain disintegrated, failing to support each other.  ...  There are three general approaches to threat modelling namely at Attacker-centric, software-centric and asset-centric.  ... 
doi:10.1007/s40860-015-0008-0 fatcat:5uzcjwxp4bhnfbq3acw6srtmny

Invariant image watermark using zernike moments

Hyung Shin Kim, Heung-Kyu Lee
2003 IEEE transactions on circuits and systems for video technology (Print)  
Image normalization method is used for scale and translation invariance. The robustness of the proposed method is demonstrated and tested by using Stirmark 3.1.  ...  The watermark is detected by comparing the computed Zernike moments of the test image and the given watermark vector. Rotation invariance is achieved by taking the magnitude of the Zernike moments.  ...  Using images of "Lena", "Mandrill", and "Fishingboat", the watermark detection ratio is measured for each class of attack generated by Stirmark benchmark software.  ... 
doi:10.1109/tcsvt.2003.815955 fatcat:4setohfg7fcevcmgkjawuamrei

Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems [article]

Sridhar Adepu, Aditya Mathur
2018 arXiv   pre-print
In S3 independent attack teams design and launch attacks on SWaT while defence teams protect the plant passively and raise alarms upon attack detection.  ...  This paper focuses on the first two instances of S3 and summarizes the benefits of hackfest and the performance of an attack detection mechanism, named Water Defense, that was exposed to attackers during  ...  to the SUTD-MIT International Design Center for partially supporting S 3 -2017; and to all the participants who traveled long distances to come to Singapore to participate in the two hackfests.  ... 
arXiv:1809.04786v1 fatcat:cokdtnlhovbr5htexfiq2uymcu

Data-Centric OS Kernel Malware Characterization

Junghwan Rhee, Ryan Riley, Zhiqiang Lin, Xuxian Jiang, Dongyan Xu
2014 IEEE Transactions on Information Forensics and Security  
As a new perspective to complement code-centric approaches, we propose a data-centric OS kernel malware characterization architecture which detects and characterizes malware attacks based on the properties  ...  Second, a new kernel malware detection approach that generates malware signatures based on the data access patterns specific to malware attacks.  ...  Several approaches [19] , [28] can detect kernel data structures based on data invariant properties such as data values and pointer connections.  ... 
doi:10.1109/tifs.2013.2291964 fatcat:xyu7ei65rzgchl7glfejrqhmdm

A case for information-bound referencing

Ashok Anand, Aditya Akella, Vyas Sekar, Srinivasan Seshan
2010 Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks - Hotnets '10  
We explore the trade-offs of various alternatives for generating and using IBRs. We identify that it is possible to adapt multimedia fingerprinting algorithms in the literature to generate IBRs.  ...  Unfortunately, the links used today (URLs) are fragile since they tightly specify a protocol, host, and filename.  ...  Acknowledgments This work was support in part by NSF grants CNS-1040757, CNS-1032226, CNS-0905134 and CNS-0746531, by CyLab at CMU under Federal Grant W911NF0910273 and by a gift from Cisco.  ... 
doi:10.1145/1868447.1868451 dblp:conf/hotnets/AnandASS10 fatcat:vj2bjq43anfopjmifdsu622fw4

A Hidden Markov Model based approach to detect Rogue Access Points

Gayathri Shivaraj, Min Song, Sachin Shetty
2008 MILCOM 2008 - 2008 IEEE Military Communications Conference  
In this paper, we propose a statistical based approach to detect rogue access points using a Hidden Markov Model applied to passively measured packetheader data collected at a gateway router.  ...  We designed and developed our Hidden Markov Model by analyzing Denial of Service attacks and the traffic characteristics of 802.11 based Wireless Local Area Networks.  ...  This property ensures that our HMM is invariant to variation in sequence lengths. With a large training data set, it is possible that larger sequence lengths will be used for the detection process.  ... 
doi:10.1109/milcom.2008.4753358 fatcat:wmhq4nlcffcyjer6dk2zspsx24
« Previous Showing results 1 — 15 out of 2,981 results