首页 > 最新文献

Proceedings of the 10th Annual Cyber and Information Security Research Conference最新文献

英文 中文
Semantic Similarity Detection For Data Leak Prevention 防止数据泄漏的语义相似度检测
Dan Du, Lu Yu, R. Brooks
To counter data breaches, we introduce a new data leak prevention (DLP) approach. Unlike regular expression methods, our approach extracts a small number of critical semantic features and requires a small training set. Existing tools concentrate mostly on data format where most defense and industry applications would be better served by monitoring the semantics of information in the enterprise. We demonstrate our approach by comparing its performance with other state-of-the-art methods, such as latent dirichlet allocation (LDA) and support vector machine (SVM). The experiment results suggest that the proposed approach have superior accuracy in terms of detection rate and false-positive (FP) rate.
为了防止数据泄露,我们引入了一种新的数据泄漏预防(DLP)方法。与正则表达式方法不同,我们的方法提取了少量的关键语义特征,并且需要一个小的训练集。现有的工具主要集中于数据格式,而大多数国防和工业应用程序可以通过监视企业中的信息语义来更好地服务于数据格式。我们通过将我们的方法与其他最先进的方法(如潜在狄利克雷分配(LDA)和支持向量机(SVM))的性能进行比较来证明我们的方法。实验结果表明,该方法在检测率和假阳性(FP)率方面具有较高的准确性。
{"title":"Semantic Similarity Detection For Data Leak Prevention","authors":"Dan Du, Lu Yu, R. Brooks","doi":"10.1145/2746266.2746270","DOIUrl":"https://doi.org/10.1145/2746266.2746270","url":null,"abstract":"To counter data breaches, we introduce a new data leak prevention (DLP) approach. Unlike regular expression methods, our approach extracts a small number of critical semantic features and requires a small training set. Existing tools concentrate mostly on data format where most defense and industry applications would be better served by monitoring the semantics of information in the enterprise. We demonstrate our approach by comparing its performance with other state-of-the-art methods, such as latent dirichlet allocation (LDA) and support vector machine (SVM). The experiment results suggest that the proposed approach have superior accuracy in terms of detection rate and false-positive (FP) rate.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131329768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Developing an Ontology for Cyber Security Knowledge Graphs 网络安全知识图谱本体的开发
Michael D. Iannacone, S. Bohn, Grant C. Nakamura, J. Gerth, Kelly M. T. Huffer, R. A. Bridges, Erik M. Ferragut, J. Goodall
In this paper we describe an ontology developed for a cyber security knowledge graph database. This is intended to provide an organized schema that incorporates information from a large variety of structured and unstructured data sources, and includes all relevant concepts within the domain. We compare the resulting ontology with previous efforts, discuss its strengths and limitations, and describe areas for future work.
本文描述了为网络安全知识图谱数据库开发的本体。这样做的目的是提供一个有组织的模式,其中包含来自各种结构化和非结构化数据源的信息,并包括领域内的所有相关概念。我们将生成的本体与之前的工作进行了比较,讨论了它的优点和局限性,并描述了未来工作的领域。
{"title":"Developing an Ontology for Cyber Security Knowledge Graphs","authors":"Michael D. Iannacone, S. Bohn, Grant C. Nakamura, J. Gerth, Kelly M. T. Huffer, R. A. Bridges, Erik M. Ferragut, J. Goodall","doi":"10.1145/2746266.2746278","DOIUrl":"https://doi.org/10.1145/2746266.2746278","url":null,"abstract":"In this paper we describe an ontology developed for a cyber security knowledge graph database. This is intended to provide an organized schema that incorporates information from a large variety of structured and unstructured data sources, and includes all relevant concepts within the domain. We compare the resulting ontology with previous efforts, discuss its strengths and limitations, and describe areas for future work.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128627907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 123
OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid 基于OPNET/Simulink的智能电网干扰检测试验台
M. Sadi, M. Ali, D. Dasgupta, R. Abercrombie
The important backbone of the Smart Grid is the cyber/information infrastructure, which is primarily used to communicate with different grid components. Smart grid is a complex cyber physical system containing a numerous and variety number of sources, devices, controllers and loads. Therefore, smart grid is vulnerable to the grid related disturbances. For such a dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and Opnet based co-simulated platform to carry out a cyber-intrusion in a cyber-network for modern power systems and smart grid. The IEEE 30 bus power system model is used to demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack. Different disturbance situations in the considered test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.
智能电网的重要支柱是网络/信息基础设施,主要用于与不同的电网组件进行通信。智能电网是一个复杂的网络物理系统,包含大量不同数量的源、设备、控制器和负载。因此,智能电网容易受到电网相关干扰的影响。对于这样一个动态系统,干扰和入侵检测是一个至关重要的问题。针对现代电力系统和智能电网,提出了一种基于Simulink和Opnet的网络入侵联合仿真平台。采用IEEE 30总线电力系统模型验证了仿真试验台的有效性。实验通过网络攻击干扰断路器的重合闸时间来完成。考虑了所考虑的测试系统中不同的干扰情况,结果表明了所提出的联合模拟方案的有效性。
{"title":"OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid","authors":"M. Sadi, M. Ali, D. Dasgupta, R. Abercrombie","doi":"10.1145/2746266.2746283","DOIUrl":"https://doi.org/10.1145/2746266.2746283","url":null,"abstract":"The important backbone of the Smart Grid is the cyber/information infrastructure, which is primarily used to communicate with different grid components. Smart grid is a complex cyber physical system containing a numerous and variety number of sources, devices, controllers and loads. Therefore, smart grid is vulnerable to the grid related disturbances. For such a dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and Opnet based co-simulated platform to carry out a cyber-intrusion in a cyber-network for modern power systems and smart grid. The IEEE 30 bus power system model is used to demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack. Different disturbance situations in the considered test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124970888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Model of an Automotive Security Concept Phase 汽车安全概念阶段的模型
Christopher Robinson-Mallett, Sebastian Hansack
The introduction of wireless interfaces into cars raises new security-related risks to the vehicle and passengers. Vulnerabilities of the vehicle electronics to remote attacks through internet connections have been demonstrated recently. The introduction of industrial-scale processes, methods and tools for the development and quality assurance of appropriate security-controls into vehicle electronics is an essential task for system providers and vehicle manufacturers to cope with security hazards. In this contribution a process model for security analysis tasks during automotive systems development is presented. The proposed model is explained on the vulnerabilities in a vehicle's remote unlock function recently published by Spaar.
将无线接口引入汽车会给车辆和乘客带来新的安全风险。最近,通过互联网连接的远程攻击已经证明了车辆电子设备的漏洞。引入工业规模的流程、方法和工具,以开发和质量保证适当的安全控制到汽车电子产品中,是系统供应商和汽车制造商应对安全隐患的基本任务。本文提出了汽车系统开发过程中安全分析任务的过程模型。根据Spaar最近公布的车辆远程解锁功能漏洞,对提出的模型进行了解释。
{"title":"A Model of an Automotive Security Concept Phase","authors":"Christopher Robinson-Mallett, Sebastian Hansack","doi":"10.1145/2746266.2746282","DOIUrl":"https://doi.org/10.1145/2746266.2746282","url":null,"abstract":"The introduction of wireless interfaces into cars raises new security-related risks to the vehicle and passengers. Vulnerabilities of the vehicle electronics to remote attacks through internet connections have been demonstrated recently. The introduction of industrial-scale processes, methods and tools for the development and quality assurance of appropriate security-controls into vehicle electronics is an essential task for system providers and vehicle manufacturers to cope with security hazards. In this contribution a process model for security analysis tasks during automotive systems development is presented. The proposed model is explained on the vulnerabilities in a vehicle's remote unlock function recently published by Spaar.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125635180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a Relation Extraction Framework for Cyber-Security Concepts 面向网络安全概念的关系抽取框架
Corinne L. Jones, R. A. Bridges, Kelly M. T. Huffer, J. Goodall
In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed. As labeled text data is scarce and expensive, we follow developments in semi-supervised Natural Language Processing and implement a bootstrapping algorithm for extracting security entities and their relationships from text. The algorithm requires little input data, specifically, a few relations or patterns (heuristics for identifying relations), and incorporates an active learning component which queries the user on the most important decisions to prevent drifting from the desired relations. Preliminary testing on a small corpus shows promising results, obtaining precision of .82.
为了帮助安全分析人员获取有关其网络的信息,例如新的漏洞、利用或补丁,需要针对安全领域定制的信息检索方法。由于标记文本数据稀缺且昂贵,我们遵循半监督自然语言处理的发展,并实现了一种自引导算法,用于从文本中提取安全实体及其关系。该算法需要很少的输入数据,特别是一些关系或模式(用于识别关系的启发式),并包含一个主动学习组件,该组件向用户询问最重要的决策,以防止偏离所需的关系。在一个小型语料库上的初步测试显示了令人满意的结果,获得了0.82的精度。
{"title":"Towards a Relation Extraction Framework for Cyber-Security Concepts","authors":"Corinne L. Jones, R. A. Bridges, Kelly M. T. Huffer, J. Goodall","doi":"10.1145/2746266.2746277","DOIUrl":"https://doi.org/10.1145/2746266.2746277","url":null,"abstract":"In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed. As labeled text data is scarce and expensive, we follow developments in semi-supervised Natural Language Processing and implement a bootstrapping algorithm for extracting security entities and their relationships from text. The algorithm requires little input data, specifically, a few relations or patterns (heuristics for identifying relations), and incorporates an active learning component which queries the user on the most important decisions to prevent drifting from the desired relations. Preliminary testing on a small corpus shows promising results, obtaining precision of .82.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127286307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Cyber Security for Additive Manufacturing 增材制造的网络安全
S. Bridges, K. Keiser, Nathan Sissom, S. Graves
This paper describes the cyber security implications of additive manufacturing (also known as 3-D printing). Three-D printing has the potential to revolutionize manufacturing and there is substantial concern for the security of the storage, transfer and execution of 3-D models across digital networks and systems. While rapidly gaining in popularity and adoption by many entities, additive manufacturing is still in its infancy. Supporting the broadest possible applications the technology will demand the ability to demonstrate secure processes from ideas, design, prototyping, production and delivery. As with other technologies in the information revolution, additive manufacturing technology is at risk of outpacing a competent security infrastructure so research and solutions need to be tackled in concert with the 3-D boom.
本文描述了增材制造(也称为3d打印)对网络安全的影响。3d打印有可能给制造业带来革命性的变化,而3d模型在数字网络和系统中的存储、传输和执行的安全性也备受关注。虽然增材制造在许多实体中迅速普及和采用,但它仍处于起步阶段。为了支持尽可能广泛的应用,该技术将要求能够展示从想法、设计、原型、生产和交付的安全流程。与信息革命中的其他技术一样,增材制造技术面临着超越安全基础设施的风险,因此研究和解决方案需要与3d热潮一起解决。
{"title":"Cyber Security for Additive Manufacturing","authors":"S. Bridges, K. Keiser, Nathan Sissom, S. Graves","doi":"10.1145/2746266.2746280","DOIUrl":"https://doi.org/10.1145/2746266.2746280","url":null,"abstract":"This paper describes the cyber security implications of additive manufacturing (also known as 3-D printing). Three-D printing has the potential to revolutionize manufacturing and there is substantial concern for the security of the storage, transfer and execution of 3-D models across digital networks and systems. While rapidly gaining in popularity and adoption by many entities, additive manufacturing is still in its infancy. Supporting the broadest possible applications the technology will demand the ability to demonstrate secure processes from ideas, design, prototyping, production and delivery. As with other technologies in the information revolution, additive manufacturing technology is at risk of outpacing a competent security infrastructure so research and solutions need to be tackled in concert with the 3-D boom.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130968624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Side-Channels in Electric Power Synchrophasor Network Data Traffic 电力同步相量网络数据传输中的侧信道
Xingsi Zhong, Paranietharan Arunagirinathan, A. Ahmadi, R. Brooks, G. Venayagamoorthy
The deployment of synchrophasor devices such as Phasor Measurement Units (PMUs) in an electric power grid enhances real-time monitoring, analysis and control of grid operations. PMU information is sensitive, and any missing or incorrect PMU data could lead to grid failure and/or damage. Therefore, it is important to use encrypted communication channels to avoid any cyber attack. However, encrypted communication channels are vulnerable to side-channel attacks. In this study, side-channel attacks using packet sizes and/or inter-packet timing delays differentiate the stream of packets from any given PMU within an encrypted tunnel. This is investigated under different experimental settings. Also, virtual private network vulnerabilities due to side-channel analysis are discussed.
在电网中部署同步相量设备,如相量测量单元(pmu),可以增强对电网运行的实时监测、分析和控制。PMU信息非常敏感,任何丢失或错误的PMU数据都可能导致电网故障和/或损坏。因此,使用加密的通信通道以避免任何网络攻击是非常重要的。然而,加密通信通道容易受到侧信道攻击。在本研究中,使用数据包大小和/或数据包间时间延迟的侧信道攻击将数据包流与加密隧道内任何给定的PMU区分开来。这在不同的实验设置下进行了研究。此外,还讨论了由于侧信道分析而导致的虚拟专用网漏洞。
{"title":"Side-Channels in Electric Power Synchrophasor Network Data Traffic","authors":"Xingsi Zhong, Paranietharan Arunagirinathan, A. Ahmadi, R. Brooks, G. Venayagamoorthy","doi":"10.1145/2746266.2746269","DOIUrl":"https://doi.org/10.1145/2746266.2746269","url":null,"abstract":"The deployment of synchrophasor devices such as Phasor Measurement Units (PMUs) in an electric power grid enhances real-time monitoring, analysis and control of grid operations. PMU information is sensitive, and any missing or incorrect PMU data could lead to grid failure and/or damage. Therefore, it is important to use encrypted communication channels to avoid any cyber attack. However, encrypted communication channels are vulnerable to side-channel attacks. In this study, side-channel attacks using packet sizes and/or inter-packet timing delays differentiate the stream of packets from any given PMU within an encrypted tunnel. This is investigated under different experimental settings. Also, virtual private network vulnerabilities due to side-channel analysis are discussed.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"435 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133684211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Analysis of Botnet Counter-Counter-Measures 僵尸网络反攻击对策分析
Yu Fu, Benafsh Husain, R. Brooks
Botnets evolve quickly to outwit police and security researchers. Since they first appeared in 1993, there have been significant botnet countermeasures. Unfortunately, countermeasures, especially takedown operations, are not particularly effective. They destroy research honeypots and stimulate botmasters to find creative ways to hide. Botnet reactions to countermeasures are more effective than countermeasures. Also, botnets are no longer confined to PCs. Android and iOS platforms are increasingly attractive targets. This paper focuses on recent countermeasures against botnets and counter-countermeasures of botmasters. We look at side effects of botnet takedowns as insight into botnet countermeasures. Then, botnet counter-countermeasures against two-factor-authentication (2FA) are discussed in Android and iOS platform. Representative botnet-in-the-mobile (BITM) implementations against 2FA are compared, and a theoretical iOS-based botnet against 2FA is described. Botnet counter-countermeasures against keyloggers are discussed. More attention needs to be paid to botnet issues.
僵尸网络发展迅速,以智取警察和安全研究人员。自1993年首次出现以来,已经出现了大量的僵尸网络对策。不幸的是,反制措施,尤其是抓捕行动,并不是特别有效。它们摧毁了研究蜜罐,并刺激机器人主人寻找创造性的隐藏方法。僵尸网络对对策的反应比对策更有效。此外,僵尸网络不再局限于个人电脑。Android和iOS平台成为越来越有吸引力的目标。本文重点介绍了近年来针对僵尸网络和僵尸管理员的对策。我们着眼于僵尸网络拆除的副作用,作为对僵尸网络对策的洞察。然后,讨论了在Android和iOS平台上针对双因素认证(2FA)的僵尸网络对策。比较了针对2FA的典型移动僵尸网络(BITM)实现,并描述了一个理论上基于ios的针对2FA的僵尸网络。讨论了针对键盘记录程序的僵尸网络反对策。需要更多地关注僵尸网络问题。
{"title":"Analysis of Botnet Counter-Counter-Measures","authors":"Yu Fu, Benafsh Husain, R. Brooks","doi":"10.1145/2746266.2746275","DOIUrl":"https://doi.org/10.1145/2746266.2746275","url":null,"abstract":"Botnets evolve quickly to outwit police and security researchers. Since they first appeared in 1993, there have been significant botnet countermeasures. Unfortunately, countermeasures, especially takedown operations, are not particularly effective. They destroy research honeypots and stimulate botmasters to find creative ways to hide. Botnet reactions to countermeasures are more effective than countermeasures. Also, botnets are no longer confined to PCs. Android and iOS platforms are increasingly attractive targets. This paper focuses on recent countermeasures against botnets and counter-countermeasures of botmasters. We look at side effects of botnet takedowns as insight into botnet countermeasures. Then, botnet counter-countermeasures against two-factor-authentication (2FA) are discussed in Android and iOS platform. Representative botnet-in-the-mobile (BITM) implementations against 2FA are compared, and a theoretical iOS-based botnet against 2FA is described. Botnet counter-countermeasures against keyloggers are discussed. More attention needs to be paid to botnet issues.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128687107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Observer Design Based Cyber Security for Cyber Physical Systems 基于观察者设计的网络物理系统安全
Z. Biron, P. Pisu, B. Homchaudhuri
In this paper, an observer based cyber-attack detection and estimation methodology for cyber physical systems is presented. The cyber-attack is considered to influence the physical part of the cyber physical system that compromises human safety. The cyber-attacks are considered to affect the sensors and the actuators in the sub-systems as well as the software programs of the control systems in the cyber physical system. The whole system is modeled as a hybrid system to incorporate the discrete and continuous part of the cyber physical system and a sliding mode based observer is designed for the detection of these cyber-attacks. For simulation purposes, this paper considers different cyber-attacks on the battery sub-system of modern automobiles and the simulation results of attack detection are presented in the paper.
本文提出了一种基于观测器的网络物理系统网络攻击检测与估计方法。网络攻击被认为是影响网络物理系统的物理部分,危及人类安全。网络攻击主要影响网络物理系统中各子系统的传感器和执行器以及控制系统的软件程序。将整个系统建模为一个混合系统,将网络物理系统的离散部分和连续部分结合起来,并设计了基于滑模的观测器来检测这些网络攻击。为了仿真目的,本文考虑了针对现代汽车电池子系统的不同网络攻击,并给出了攻击检测的仿真结果。
{"title":"Observer Design Based Cyber Security for Cyber Physical Systems","authors":"Z. Biron, P. Pisu, B. Homchaudhuri","doi":"10.1145/2746266.2746272","DOIUrl":"https://doi.org/10.1145/2746266.2746272","url":null,"abstract":"In this paper, an observer based cyber-attack detection and estimation methodology for cyber physical systems is presented. The cyber-attack is considered to influence the physical part of the cyber physical system that compromises human safety. The cyber-attacks are considered to affect the sensors and the actuators in the sub-systems as well as the software programs of the control systems in the cyber physical system. The whole system is modeled as a hybrid system to incorporate the discrete and continuous part of the cyber physical system and a sliding mode based observer is designed for the detection of these cyber-attacks. For simulation purposes, this paper considers different cyber-attacks on the battery sub-system of modern automobiles and the simulation results of attack detection are presented in the paper.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126268702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Phase-Space Detection of Cyber Events 网络事件的相空间检测
J. M. Hernández, Aaron Ferber, S. Prowell, L. Hively
Energy Delivery Systems (EDS) are a network of processes that produce, transfer and distribute energy. EDS are increasingly dependent on networked computing assets, as are many Industrial Control Systems. Consequently, cyber-attacks pose a real and pertinent threat, as evidenced by Stuxnet, Shamoon and Dragonfly. Hence, there is a critical need for novel methods to detect, prevent, and mitigate effects of such attacks. To detect cyber-attacks in EDS, we developed a framework for gathering and analyzing timing data that involves establishing a baseline execution profile and then capturing the effect of perturbations in the state from injecting various malware. The data analysis was based on nonlinear dynamics and graph theory to improve detection of anomalous events in cyber applications. The goal was the extraction of changing dynamics or anomalous activity in the underlying computer system. Takens' theorem in nonlinear dynamics allows reconstruction of topologically invariant, time-delay-embedding states from the computer data in a sufficiently high-dimensional space. The resultant dynamical states were nodes, and the state-to-state transitions were links in a mathematical graph. Alternatively, sequential tabulation of executing instructions provides the nodes with corresponding instruction-to-instruction links. Graph theorems guarantee graph-invariant measures to quantify the dynamical changes in the running applications. Results showed a successful detection of cyber events.
能源输送系统(EDS)是一个生产、传输和分配能源的过程网络。EDS越来越依赖于网络计算资产,正如许多工业控制系统一样。因此,网络攻击构成了真实而相关的威胁,正如震网、Shamoon和蜻蜓所证明的那样。因此,迫切需要新的方法来检测、预防和减轻此类攻击的影响。为了检测EDS中的网络攻击,我们开发了一个用于收集和分析时序数据的框架,该框架涉及建立基线执行概况,然后捕获注入各种恶意软件的状态扰动的影响。数据分析基于非线性动力学和图论,以提高网络应用中异常事件的检测能力。目标是提取底层计算机系统中不断变化的动态或异常活动。非线性动力学中的Takens定理允许从足够高维空间的计算机数据中重建拓扑不变,时延嵌入状态。生成的动态状态是节点,状态到状态的转换是数学图中的链接。或者,执行指令的顺序制表为节点提供相应的指令到指令链接。图定理保证了图不变度量来量化运行中的应用程序中的动态变化。结果显示,该系统成功检测到了网络事件。
{"title":"Phase-Space Detection of Cyber Events","authors":"J. M. Hernández, Aaron Ferber, S. Prowell, L. Hively","doi":"10.1145/2746266.2746279","DOIUrl":"https://doi.org/10.1145/2746266.2746279","url":null,"abstract":"Energy Delivery Systems (EDS) are a network of processes that produce, transfer and distribute energy. EDS are increasingly dependent on networked computing assets, as are many Industrial Control Systems. Consequently, cyber-attacks pose a real and pertinent threat, as evidenced by Stuxnet, Shamoon and Dragonfly. Hence, there is a critical need for novel methods to detect, prevent, and mitigate effects of such attacks. To detect cyber-attacks in EDS, we developed a framework for gathering and analyzing timing data that involves establishing a baseline execution profile and then capturing the effect of perturbations in the state from injecting various malware. The data analysis was based on nonlinear dynamics and graph theory to improve detection of anomalous events in cyber applications. The goal was the extraction of changing dynamics or anomalous activity in the underlying computer system. Takens' theorem in nonlinear dynamics allows reconstruction of topologically invariant, time-delay-embedding states from the computer data in a sufficiently high-dimensional space. The resultant dynamical states were nodes, and the state-to-state transitions were links in a mathematical graph. Alternatively, sequential tabulation of executing instructions provides the nodes with corresponding instruction-to-instruction links. Graph theorems guarantee graph-invariant measures to quantify the dynamical changes in the running applications. Results showed a successful detection of cyber events.","PeriodicalId":106769,"journal":{"name":"Proceedings of the 10th Annual Cyber and Information Security Research Conference","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126675030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
Proceedings of the 10th Annual Cyber and Information Security Research Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1