A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation
2021
Cybersecurity
The use of these approaches leads to relatively easier and faster creation of anomaly detectors compared to the use of design-centric approaches that are based on plant physics and design. ...
Towards this end, a class of anomaly detectors, created using data-centric approaches, are gaining attention. ...
NRF2016NCR-NCR002-023 and NRF2018NCR-NSOE005-0001) and administered by the National Cybersecurity R&D Directorate. 1 iTrust, Singapore University of Technology and Design (SUTD) ...
doi:10.1186/s42400-021-00095-5
fatcat:fr4h45z5zzhsfod4z663iildl4
Cyber-Physical Security of an Electric Microgrid
2018
2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)
Invariants are manually generated using the insights obtained through MSDND analysis and use linear regression to automate the generation of invariants. ...
Limitations of the design and successes/shortcomings of attack mitigation are reported. iv ACKNOWLEDGMENTS First and foremost, I would like to express my reverence and gratitude to my advisor and professional ...
In this document, we examine the general security concerns of an electric grid through a testbed instantiation using Design-centric approach (DeC) and Data-centric approach (DaC). ...
doi:10.1109/prdc.2018.00018
dblp:conf/prdc/PalaniswamyM18
fatcat:myoathbambbj7fpa3vt3ckoim4
Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?
2021
Energy Informatics
AbstractDistributed generators (D.G.'s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. ...
This paper aims to present a comprehensive Edge-based security architecture to help reduce the risks and help secure the physical systems and ensure privacy and data protection. ...
Buczak et al. present a survey on using data mining and machine learning techniques as methods for intrusion detection. (Buczak & Guven, 2016) . ...
doi:10.1186/s42162-021-00139-7
pmid:35224445
pmcid:PMC8010494
fatcat:x6r4viitbfekndinlbbhkujhne
Enhanced Position Verification for VANETs using Subjective Logic
[article]
2017
arXiv
pre-print
A more general approach to validate such information is by applying misbehavior detection mechanisms. ...
In this paper, we consider misbehavior detection by enhancing two position verification mechanisms and fusing their results in a generalized framework using subjective logic. ...
ACKNOWLEDGMENT This work was performed on the computational resource bwUniCluster funded by the Ministry of Science, Research and the Arts Baden-Württemberg and the Universities of the State of Baden-Württemberg ...
arXiv:1703.10399v1
fatcat:4agwkpitvbfhvcmsrywwn5yxma
Enhanced Position Verification for VANETs Using Subjective Logic
2016
2016 IEEE 84th Vehicular Technology Conference (VTC-Fall)
A more general approach to validate such information is by applying misbehavior detection mechanisms. ...
In this paper, we consider misbehavior detection by enhancing two position verification mechanisms and fusing their results in a generalized framework using subjective logic. ...
ACKNOWLEDGMENT This work was performed on the computational resource bwUniCluster funded by the Ministry of Science, Research and the Arts Baden-Württemberg and the Universities of the State of Baden-Württemberg ...
doi:10.1109/vtcfall.2016.7881000
dblp:conf/vtc/HeijdenAKA16
fatcat:qahyceirujc63cbavm2bs3vjoq
Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems
2018
IEEE Communications Surveys and Tutorials
However, because attackers can be insiders within the network (i.e., possess valid key material), this approach cannot detect all possible attacks. ...
In this survey, we present misbehavior detection mechanisms that can detect such insider attacks based on attacker behavior and information analysis. ...
Acknowledgements We thank Anke Jentzsch and Hendrik Decke from Volkswagen AG, Germany, for their cooperation, feedback and fruitful discussions concerning this survey. ...
doi:10.1109/comst.2018.2873088
fatcat:obf72ruawrgwrpqe2vizcsbqtm
Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning
[article]
2021
arXiv
pre-print
Automatically generated attacks improve our understanding of the potential attacks and enable the design of robust attack detection techniques. ...
Adversarial learning is used to test the robustness of machine learning algorithms under attack and create attacks that deceive the anomaly detection methods in Industrial Control System (ICS). ...
EVALUATION AND DISCUSSION To validate the generated attack patterns, we replicated the experiments performed in [21] using the data-centric approach. ...
arXiv:2107.05127v1
fatcat:zytttpycwbfwvptxfurzzqhlzu
Deriving invariant checkers for critical infrastructure using axiomatic design principles
2021
Cybersecurity
Many approaches for identifying invariants attempt to do so automatically, typically using data logs, but these can miss valid system properties if relevant behaviours are not well-represented in the data ...
We apply our method to the designs of two CPS testbeds, SWaT and WADI, deriving a suite of invariant checkers that are able to detect a variety of single- and multi-stage attacks without any false positives ...
Availability of data and materials The datasets used in this research are available online (iTrust Labs: Datasets 2020). ...
doi:10.1186/s42400-021-00069-7
fatcat:ck7trtf4pvgrdjc3vorufmdes4
Cascading effects of cyber-attacks on interconnected critical infrastructure
2021
Cybersecurity
One source of complexity in such systems is due to the intra-system interactions and inter-dependencies. Consequently, these systems are a potential target for attackers. ...
In this paper, we report a study to investigate the cascading effects of cyber-attacks on two interdependent critical infrastructure namely, a Secure water treatment plant (SWaT) and a Water Distribution ...
VKM and AM provided technical feedback throughout the work. All authors reviewed the final manuscript. All authors read and approved the final manuscript. ...
doi:10.1186/s42400-021-00071-z
fatcat:7hfbociyovcshbb5xhjsmrgb6q
Modelling cyber security for software-defined networks those grow strong when exposed to threats
2015
Journal of Reliable Intelligent Environments
Second, it advocates the necessity and introduces a novel approach of antifragile cyber security within SDN paradigm and finally it proposes a unified model for integrating both approaches of "Security ...
Both these perspectives of "Security with SDN" and "Security for SDN" have invited research and innovations, yet both these approaches remain disintegrated, failing to support each other. ...
There are three general approaches to threat modelling namely at Attacker-centric, software-centric and asset-centric. ...
doi:10.1007/s40860-015-0008-0
fatcat:5uzcjwxp4bhnfbq3acw6srtmny
Invariant image watermark using zernike moments
2003
IEEE transactions on circuits and systems for video technology (Print)
Image normalization method is used for scale and translation invariance. The robustness of the proposed method is demonstrated and tested by using Stirmark 3.1. ...
The watermark is detected by comparing the computed Zernike moments of the test image and the given watermark vector. Rotation invariance is achieved by taking the magnitude of the Zernike moments. ...
Using images of "Lena", "Mandrill", and "Fishingboat", the watermark detection ratio is measured for each class of attack generated by Stirmark benchmark software. ...
doi:10.1109/tcsvt.2003.815955
fatcat:4setohfg7fcevcmgkjawuamrei
Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems
[article]
2018
arXiv
pre-print
In S3 independent attack teams design and launch attacks on SWaT while defence teams protect the plant passively and raise alarms upon attack detection. ...
This paper focuses on the first two instances of S3 and summarizes the benefits of hackfest and the performance of an attack detection mechanism, named Water Defense, that was exposed to attackers during ...
to the SUTD-MIT International Design Center for partially supporting S 3 -2017; and to all the participants who traveled long distances to come to Singapore to participate in the two hackfests. ...
arXiv:1809.04786v1
fatcat:cokdtnlhovbr5htexfiq2uymcu
Data-Centric OS Kernel Malware Characterization
2014
IEEE Transactions on Information Forensics and Security
As a new perspective to complement code-centric approaches, we propose a data-centric OS kernel malware characterization architecture which detects and characterizes malware attacks based on the properties ...
Second, a new kernel malware detection approach that generates malware signatures based on the data access patterns specific to malware attacks. ...
Several approaches [19] , [28] can detect kernel data structures based on data invariant properties such as data values and pointer connections. ...
doi:10.1109/tifs.2013.2291964
fatcat:xyu7ei65rzgchl7glfejrqhmdm
A case for information-bound referencing
2010
Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks - Hotnets '10
We explore the trade-offs of various alternatives for generating and using IBRs. We identify that it is possible to adapt multimedia fingerprinting algorithms in the literature to generate IBRs. ...
Unfortunately, the links used today (URLs) are fragile since they tightly specify a protocol, host, and filename. ...
Acknowledgments This work was support in part by NSF grants CNS-1040757, CNS-1032226, CNS-0905134 and CNS-0746531, by CyLab at CMU under Federal Grant W911NF0910273 and by a gift from Cisco. ...
doi:10.1145/1868447.1868451
dblp:conf/hotnets/AnandASS10
fatcat:vj2bjq43anfopjmifdsu622fw4
A Hidden Markov Model based approach to detect Rogue Access Points
2008
MILCOM 2008 - 2008 IEEE Military Communications Conference
In this paper, we propose a statistical based approach to detect rogue access points using a Hidden Markov Model applied to passively measured packetheader data collected at a gateway router. ...
We designed and developed our Hidden Markov Model by analyzing Denial of Service attacks and the traffic characteristics of 802.11 based Wireless Local Area Networks. ...
This property ensures that our HMM is invariant to variation in sequence lengths. With a large training data set, it is possible that larger sequence lengths will be used for the detection process. ...
doi:10.1109/milcom.2008.4753358
fatcat:wmhq4nlcffcyjer6dk2zspsx24
« Previous
Showing results 1 — 15 out of 2,981 results