首页 > 最新文献

IET Cyber-Physical Systems: Theory and Applications最新文献

英文 中文
Analysis of Damping Characteristics in Wind Turbine-Energy Storage Hybrid Systems Based on Path Module
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-07 DOI: 10.1049/cps2.70006
Shanshan Cheng, Haixin Wang, Jing Li, Shengyang Lu, Xinyi Lu, Junyou Yang, Zhe Chen

Current analytical methods are inadequate in uncovering the internal propagation mechanisms of disturbances and the interconnections between subsystems in the wind turbine-storage integrated grid connected system, which faces stability issues. Therefore, this paper employs a damping module modelling approach to conduct a dynamic analysis of the dynamic interactions in wind turbine-storage storage integrated systems, focusing on the damping path analysis with the phase-locked loop (PLL) as the oscillation mode. The research initiates with the linearisation of the doubly-fed induction generator (DFIG) and energy storage system (ESS) models. The closed-loop structure of the system is then presented to expose the disturbance propagation paths between subsystems. Subsequently, the damping coefficients of the second-order dynamic equation are expanded to include the dynamic equations of the most prominent oscillation mode, which establishes stability criteria for the system. Finally, by performing damping decomposition and reconstruction, the damping coefficients of each subsystem as well as the total damping coefficient of the interconnection system are obtained. An analysis is conducted on how the proportional-integral parameters of the PLL affect the damping of the interconnection system. The results suggest that the damping paths of the DFIG and the ESS can be expressed as a closed-loop structure diagram. By decreasing the proportional or integral coefficients of the PLL, the overall damping coefficient is increased, resulting in an enhancement of the stability of the grid-connected system.

{"title":"Analysis of Damping Characteristics in Wind Turbine-Energy Storage Hybrid Systems Based on Path Module","authors":"Shanshan Cheng,&nbsp;Haixin Wang,&nbsp;Jing Li,&nbsp;Shengyang Lu,&nbsp;Xinyi Lu,&nbsp;Junyou Yang,&nbsp;Zhe Chen","doi":"10.1049/cps2.70006","DOIUrl":"https://doi.org/10.1049/cps2.70006","url":null,"abstract":"<p>Current analytical methods are inadequate in uncovering the internal propagation mechanisms of disturbances and the interconnections between subsystems in the wind turbine-storage integrated grid connected system, which faces stability issues. Therefore, this paper employs a damping module modelling approach to conduct a dynamic analysis of the dynamic interactions in wind turbine-storage storage integrated systems, focusing on the damping path analysis with the phase-locked loop (PLL) as the oscillation mode. The research initiates with the linearisation of the doubly-fed induction generator (DFIG) and energy storage system (ESS) models. The closed-loop structure of the system is then presented to expose the disturbance propagation paths between subsystems. Subsequently, the damping coefficients of the second-order dynamic equation are expanded to include the dynamic equations of the most prominent oscillation mode, which establishes stability criteria for the system. Finally, by performing damping decomposition and reconstruction, the damping coefficients of each subsystem as well as the total damping coefficient of the interconnection system are obtained. An analysis is conducted on how the proportional-integral parameters of the PLL affect the damping of the interconnection system. The results suggest that the damping paths of the DFIG and the ESS can be expressed as a closed-loop structure diagram. By decreasing the proportional or integral coefficients of the PLL, the overall damping coefficient is increased, resulting in an enhancement of the stability of the grid-connected system.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143571232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Ports of Web Applications Against Cross Site Port Attack (XSPA) by Using a Strong Session Identifier (Session ID)
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-25 DOI: 10.1049/cps2.70005
Kavita Bhatia, Santosh K. Pandey, Vivek K. Singh, Deena Nath Gupta

XSPA vulnerability can be attacked by stealing the cookie's information. In this case, it becomes utmost necessary to secure the information written in a cookie. A cookie contains a session ID that is a unique number generated by the server. This session ID must be a large random number so that no one can guess a valid session ID in real-time. Numerous research studies have been accomplished on the same but the area still persist gaps in view of emerging threats, such as phishing, pharming, and DoS. This paper proposes a new random-number generator that produces unique numbers in bulk. This helps the server to match the high demand of unique session IDs from different clients. The proposed generator is suitable for all types of web applications, because it requires the smallest area of only 134 Gate Equivalent on the application specific integrated circuit (ASIC) for its execution. Additionally, the proposed generator passed all tests of EPCglobal. Total time delay of digital circuit and power analysis results presented in the subsequent sections are also in the favour of proposed generator. With the implementation of this proposed technique cookies are expected to be more secure as evident from try-out results.

{"title":"Securing Ports of Web Applications Against Cross Site Port Attack (XSPA) by Using a Strong Session Identifier (Session ID)","authors":"Kavita Bhatia,&nbsp;Santosh K. Pandey,&nbsp;Vivek K. Singh,&nbsp;Deena Nath Gupta","doi":"10.1049/cps2.70005","DOIUrl":"https://doi.org/10.1049/cps2.70005","url":null,"abstract":"<p>XSPA vulnerability can be attacked by stealing the cookie's information. In this case, it becomes utmost necessary to secure the information written in a cookie. A cookie contains a session ID that is a unique number generated by the server. This session ID must be a large random number so that no one can guess a valid session ID in real-time. Numerous research studies have been accomplished on the same but the area still persist gaps in view of emerging threats, such as phishing, pharming, and DoS. This paper proposes a new random-number generator that produces unique numbers in bulk. This helps the server to match the high demand of unique session IDs from different clients. The proposed generator is suitable for all types of web applications, because it requires the smallest area of only 134 Gate Equivalent on the application specific integrated circuit (ASIC) for its execution. Additionally, the proposed generator passed all tests of EPCglobal. Total time delay of digital circuit and power analysis results presented in the subsequent sections are also in the favour of proposed generator. With the implementation of this proposed technique cookies are expected to be more secure as evident from try-out results.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70005","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143481347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive learning anomaly detection and classification model for cyber and physical threats in industrial control systems
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-14 DOI: 10.1049/cps2.70004
Gabriela Ahmadi-Assalemi, Haider Al-Khateeb, Vladlena Benson, Bogdan Adamyk, Meryem Ammi

A surge of digital technologies adopted into Industrial Control Systems (ICS) exposes critical infrastructures to increasingly hostile and well-organised cybercrime. The increased need for flexibility and convenient administration expands the attack surface. Likewise, an insider with authorised access reveals a difficult-to-detect attack vector. Because of the range of critical services that ICS provide, disruptions to operations could have devastating consequences making ICS an attractive target for sophisticated threat actors. Hence, the authors introduce a novel anomalous behaviour detection model for ICS data streams from physical plant sensors. A model for one-class classification is developed, using stream rebalancing followed by adaptive machine learning algorithms coupled with drift detection methods to detect anomalies from physical plant sensor data. The authors’ approach is shown on ICS datasets. Additionally, a use case illustrates the model's applicability to post-incident investigations as part of a defence-in-depth capability in ICS. The experimental results show that the proposed model achieves an overall Matthews Correlation Coefficient score of 0.999 and Cohen's Kappa score of 0.9986 on limited variable single-type anomalous behaviour per data stream. The results on wide data streams achieve an MCC score of 0.981 and a K score of 0.9808 in the prevalence of multiple types of anomalous instances.

{"title":"Adaptive learning anomaly detection and classification model for cyber and physical threats in industrial control systems","authors":"Gabriela Ahmadi-Assalemi,&nbsp;Haider Al-Khateeb,&nbsp;Vladlena Benson,&nbsp;Bogdan Adamyk,&nbsp;Meryem Ammi","doi":"10.1049/cps2.70004","DOIUrl":"https://doi.org/10.1049/cps2.70004","url":null,"abstract":"<p>A surge of digital technologies adopted into Industrial Control Systems (ICS) exposes critical infrastructures to increasingly hostile and well-organised cybercrime. The increased need for flexibility and convenient administration expands the attack surface. Likewise, an insider with authorised access reveals a difficult-to-detect attack vector. Because of the range of critical services that ICS provide, disruptions to operations could have devastating consequences making ICS an attractive target for sophisticated threat actors. Hence, the authors introduce a novel anomalous behaviour detection model for ICS data streams from physical plant sensors. A model for one-class classification is developed, using stream rebalancing followed by adaptive machine learning algorithms coupled with drift detection methods to detect anomalies from physical plant sensor data. The authors’ approach is shown on ICS datasets. Additionally, a use case illustrates the model's applicability to post-incident investigations as part of a defence-in-depth capability in ICS. The experimental results show that the proposed model achieves an overall Matthews Correlation Coefficient score of 0.999 and Cohen's Kappa score of 0.9986 on limited variable single-type anomalous behaviour per data stream. The results on wide data streams achieve an MCC score of 0.981 and a K score of 0.9808 in the prevalence of multiple types of anomalous instances.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143404626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multiscale and multilevel fusion network based on ResNet and MobileFaceNet for facial expression recognition
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-10 DOI: 10.1049/cps2.70003
Jiao Ding, Tianfei Zhang, Li Yang, Tianhan Hu

There are complex correlations between facial expression and facial landmarks in facial images. The facial landmarks detection technology is more mature than the facial expression recognition methods. Considering this, in order to better address the problem of interclass similarity and intraclass discrepancy in facial expressions recognition (FER), facial landmarks are used to supervise the learning of facial expression features in our work, and a multiscale and multilevel fusion network based on ResNet and MobileFaceNet (MMFRM) is proposed for FER. Specifically, the authors designed a triple CBAM feature fusion module (TCFFM) that characterises the correlation between facial expression and facial landmarks to better guide the learning of expression features. Furthermore, the proposed loss function of removing facial residual features (RFLoss) can suppress facial features and highlight expression features. We extensively validate our proposed MMFRM on two public facial expression datasets, demonstrating the effectiveness of our method.

{"title":"A multiscale and multilevel fusion network based on ResNet and MobileFaceNet for facial expression recognition","authors":"Jiao Ding,&nbsp;Tianfei Zhang,&nbsp;Li Yang,&nbsp;Tianhan Hu","doi":"10.1049/cps2.70003","DOIUrl":"https://doi.org/10.1049/cps2.70003","url":null,"abstract":"<p>There are complex correlations between facial expression and facial landmarks in facial images. The facial landmarks detection technology is more mature than the facial expression recognition methods. Considering this, in order to better address the problem of interclass similarity and intraclass discrepancy in facial expressions recognition (FER), facial landmarks are used to supervise the learning of facial expression features in our work, and a multiscale and multilevel fusion network based on ResNet and MobileFaceNet (MMFRM) is proposed for FER. Specifically, the authors designed a triple CBAM feature fusion module (TCFFM) that characterises the correlation between facial expression and facial landmarks to better guide the learning of expression features. Furthermore, the proposed loss function of removing facial residual features (RFLoss) can suppress facial features and highlight expression features. We extensively validate our proposed MMFRM on two public facial expression datasets, demonstrating the effectiveness of our method.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143379956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient learning of uncertainty distributions in coupled multidisciplinary systems through sensory data
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-04 DOI: 10.1049/cps2.70000
Negar Asadi, Seyede Fatemeh Ghoreishi

Coupled multidisciplinary systems are fundamental to many complex engineering systems, such as those in cyber–physical systems, aerospace engineering, automotive systems, energy networks, and robotics. Accurate analysis, control, and monitoring of these systems depend on effectively inferring their inherent uncertainties. However, the dynamic nature of these systems, along with the interconnectivity of various disciplines, poses significant challenges for uncertainty estimation. This paper presents a framework for learning uncertainty distributions in partially observed coupled multidisciplinary systems. By employing a non-linear/non-Gaussian hidden Markov model (HMM) representation, the authors capture the stochastic nature of system states and observations. The proposed methodology leverages particle filtering techniques and Bayesian optimisation for efficient parameter estimation, accounting for the inherent uncertainties in input statistics. Numerical experiments on a coupled aerodynamics-structures system and a power converter system demonstrate the efficacy of the proposed method in estimating input distribution statistics. The results highlight the critical importance of accounting for non-stationary behaviours in coupled multidisciplinary systems for capturing the true variability of input statistics and showcase the superiority of our method over approaches that assume data derive from the stationary state of the system.

{"title":"Efficient learning of uncertainty distributions in coupled multidisciplinary systems through sensory data","authors":"Negar Asadi,&nbsp;Seyede Fatemeh Ghoreishi","doi":"10.1049/cps2.70000","DOIUrl":"https://doi.org/10.1049/cps2.70000","url":null,"abstract":"<p>Coupled multidisciplinary systems are fundamental to many complex engineering systems, such as those in cyber–physical systems, aerospace engineering, automotive systems, energy networks, and robotics. Accurate analysis, control, and monitoring of these systems depend on effectively inferring their inherent uncertainties. However, the dynamic nature of these systems, along with the interconnectivity of various disciplines, poses significant challenges for uncertainty estimation. This paper presents a framework for learning uncertainty distributions in partially observed coupled multidisciplinary systems. By employing a non-linear/non-Gaussian hidden Markov model (HMM) representation, the authors capture the stochastic nature of system states and observations. The proposed methodology leverages particle filtering techniques and Bayesian optimisation for efficient parameter estimation, accounting for the inherent uncertainties in input statistics. Numerical experiments on a coupled aerodynamics-structures system and a power converter system demonstrate the efficacy of the proposed method in estimating input distribution statistics. The results highlight the critical importance of accounting for non-stationary behaviours in coupled multidisciplinary systems for capturing the true variability of input statistics and showcase the superiority of our method over approaches that assume data derive from the stationary state of the system.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70000","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143111841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FL-ADS: Federated learning anomaly detection system for distributed energy resource networks FL-ADS:分布式能源资源网络联合学习异常检测系统
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-29 DOI: 10.1049/cps2.70001
Shaurya Purohit, Manimaran Govindarasu, Benjamin Blakely

With the ongoing development of Distributed Energy Resources (DER) communication networks, the imperative for strong cybersecurity and data privacy safeguards is increasingly evident. DER networks, which rely on protocols such as Distributed Network Protocol 3 and Modbus, are susceptible to cyberattacks such as data integrity breaches and denial of service due to their inherent security vulnerabilities. This paper introduces an innovative Federated Learning (FL)-based anomaly detection system designed to enhance the security of DER networks while preserving data privacy. Our models leverage Vertical and Horizontal Federated Learning to enable collaborative learning while preserving data privacy, exchanging only non-sensitive information, such as model parameters, and maintaining the privacy of DER clients' raw data. The effectiveness of the models is demonstrated through its evaluation on datasets representative of real-world DER scenarios, showcasing significant improvements in accuracy and F1-score across all clients compared to the traditional baseline model. Additionally, this work demonstrates a consistent reduction in loss function over multiple FL rounds, further validating its efficacy and offering a robust solution that balances effective anomaly detection with stringent data privacy needs.

{"title":"FL-ADS: Federated learning anomaly detection system for distributed energy resource networks","authors":"Shaurya Purohit,&nbsp;Manimaran Govindarasu,&nbsp;Benjamin Blakely","doi":"10.1049/cps2.70001","DOIUrl":"https://doi.org/10.1049/cps2.70001","url":null,"abstract":"<p>With the ongoing development of Distributed Energy Resources (DER) communication networks, the imperative for strong cybersecurity and data privacy safeguards is increasingly evident. DER networks, which rely on protocols such as Distributed Network Protocol 3 and Modbus, are susceptible to cyberattacks such as data integrity breaches and denial of service due to their inherent security vulnerabilities. This paper introduces an innovative Federated Learning (FL)-based anomaly detection system designed to enhance the security of DER networks while preserving data privacy. Our models leverage Vertical and Horizontal Federated Learning to enable collaborative learning while preserving data privacy, exchanging only non-sensitive information, such as model parameters, and maintaining the privacy of DER clients' raw data. The effectiveness of the models is demonstrated through its evaluation on datasets representative of real-world DER scenarios, showcasing significant improvements in accuracy and F1-score across all clients compared to the traditional baseline model. Additionally, this work demonstrates a consistent reduction in loss function over multiple FL rounds, further validating its efficacy and offering a robust solution that balances effective anomaly detection with stringent data privacy needs.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.70001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143120821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysing a multi-stage cyber threat and its impact on the power system
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-24 DOI: 10.1049/cps2.12107
Leen Al Homoud, Namrata Barpanda, Vinicius Bobato, Ana Goulart, Kate Davis, Mark Rice

Electric power systems are composed of physical and cyber sub-systems. The sub-systems depend on each other. If the cyber sub-system is compromised by a cyber threat, what is the impact on the physical system? This paper presents a case study that shows the steps of a multi-stage cyber threat involving a database injection attack, and what happens to the power system if this threat is not detected in its early stages. The threat first affects one utility but it can spread to the balancing authority, which is responsible for keeping the voltage and frequency stable in the power grid. During the cyber threat, the authors also show defence tools, such as a cyber-physical data fusion tool that displays and analyses power and cyber telemetry.

{"title":"Analysing a multi-stage cyber threat and its impact on the power system","authors":"Leen Al Homoud,&nbsp;Namrata Barpanda,&nbsp;Vinicius Bobato,&nbsp;Ana Goulart,&nbsp;Kate Davis,&nbsp;Mark Rice","doi":"10.1049/cps2.12107","DOIUrl":"https://doi.org/10.1049/cps2.12107","url":null,"abstract":"<p>Electric power systems are composed of physical and cyber sub-systems. The sub-systems depend on each other. If the cyber sub-system is compromised by a cyber threat, what is the impact on the physical system? This paper presents a case study that shows the steps of a multi-stage cyber threat involving a database injection attack, and what happens to the power system if this threat is not detected in its early stages. The threat first affects one utility but it can spread to the balancing authority, which is responsible for keeping the voltage and frequency stable in the power grid. During the cyber threat, the authors also show defence tools, such as a cyber-physical data fusion tool that displays and analyses power and cyber telemetry.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12107","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143118620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Motif-based resiliency assessment for cyber-physical power systems under various hazards
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-17 DOI: 10.1049/cps2.12103
Hamed M. Binqadhi, Mohammed M. AlMuhaini, H. Vincent Poor, David Flynn, Hao Huang

Cyber-physical power systems (CPPS) are integral to meeting society's demand for secure, sustainable, affordable and resilient critical networks and services. Given the convergence of decarbonising, heating, cooling, and transportation networks onto cyber-physical power systems (CPPS), this takes on increased significance. This paper introduces an innovative approach to the open challenge of how we evaluate CPPS resilience, presenting the use of network motifs and Monte Carlo simulations. We demonstrate how our methodology enables a comprehensive analysis of CPPS by capturing the interdependence between cyber and physical networks and by accounting for inherent uncertainties in cyber and physical components. Specifically, this method incorporates the dynamic interplay between the physical and cyber networks, presenting a time-dependent motif-based resilience metric. This metric evaluates CPPS performance in maintaining critical loads during and after diverse extreme events in cyber and/or physical layers. The resilience status of the system is determined using the prevalence of 4-node motifs within the system's network, offering valuable redundant paths for critical load supply. The study models a variety of natural events, including earthquakes, windstorms, and tornadoes, along with cyber-attacks while accounting for their inherent uncertainties using Monte Carlo simulation. The proposed approach is demonstrated through two test CPPS, specifically the IEEE 14-bus and IEEE 30-bus test systems, affirming its effectiveness in quantifying CPPS resilience. By comprehensively addressing system dynamics, interdependencies, and uncertainties, the proposed technique advances our understanding of CPPS and supports resilient system design.

{"title":"Motif-based resiliency assessment for cyber-physical power systems under various hazards","authors":"Hamed M. Binqadhi,&nbsp;Mohammed M. AlMuhaini,&nbsp;H. Vincent Poor,&nbsp;David Flynn,&nbsp;Hao Huang","doi":"10.1049/cps2.12103","DOIUrl":"https://doi.org/10.1049/cps2.12103","url":null,"abstract":"<p>Cyber-physical power systems (CPPS) are integral to meeting society's demand for secure, sustainable, affordable and resilient critical networks and services. Given the convergence of decarbonising, heating, cooling, and transportation networks onto cyber-physical power systems (CPPS), this takes on increased significance. This paper introduces an innovative approach to the open challenge of how we evaluate CPPS resilience, presenting the use of network motifs and Monte Carlo simulations. We demonstrate how our methodology enables a comprehensive analysis of CPPS by capturing the interdependence between cyber and physical networks and by accounting for inherent uncertainties in cyber and physical components. Specifically, this method incorporates the dynamic interplay between the physical and cyber networks, presenting a time-dependent motif-based resilience metric. This metric evaluates CPPS performance in maintaining critical loads during and after diverse extreme events in cyber and/or physical layers. The resilience status of the system is determined using the prevalence of 4-node motifs within the system's network, offering valuable redundant paths for critical load supply. The study models a variety of natural events, including earthquakes, windstorms, and tornadoes, along with cyber-attacks while accounting for their inherent uncertainties using Monte Carlo simulation. The proposed approach is demonstrated through two test CPPS, specifically the IEEE 14-bus and IEEE 30-bus test systems, affirming its effectiveness in quantifying CPPS resilience. By comprehensively addressing system dynamics, interdependencies, and uncertainties, the proposed technique advances our understanding of CPPS and supports resilient system design.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2024-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143362384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards autonomous device protection using behavioural profiling and generative artificial intelligence
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-11 DOI: 10.1049/cps2.12102
Sandeep Gupta, Bruno Crispo

Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid proliferation of deployed devices and escalating cyberattacks. Consequently, cybersecurity measures with an improved generalisation that can proactively determine the indicators of compromises to predict 0-day threats or previously unseen malware together with known malware are highly desirable. In this article, the authors present a novel concept of autonomous device protection based on behavioural profiling by continuously monitoring internal resource usage and leveraging generative artificial intelligence (genAI) to distinguish between benign and malicious behaviour. The authors design a proof-of-concept for Windows-based computing devices relying on a built-in event tracing mechanism for log collection that is converted into structured data using a graph data structure. The authors extract graph-level features, that is, graph depth, nodes count, number of leaf nodes, node degree statistics, and events count and node-level features (NLF), that is, process start, file create and registry events details for each graph. Further, the authors investigate the use of genAI exploiting a pre-trained large language network—a simple contrastive sentence embedding framework to extract strong features, that is, dense vectors from event graphs. Finally, the authors train a random forest classifier using both the graph-level features and NLF to obtain classification models that are evaluated on a collected dataset containing one thousand benign and malicious samples achieving accuracy up to 99.25%.

{"title":"Towards autonomous device protection using behavioural profiling and generative artificial intelligence","authors":"Sandeep Gupta,&nbsp;Bruno Crispo","doi":"10.1049/cps2.12102","DOIUrl":"https://doi.org/10.1049/cps2.12102","url":null,"abstract":"<p>Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid proliferation of deployed devices and escalating cyberattacks. Consequently, cybersecurity measures with an improved generalisation that can proactively determine the indicators of compromises to predict 0-day threats or previously unseen malware together with known malware are highly desirable. In this article, the authors present a novel concept of autonomous device protection based on behavioural profiling by continuously monitoring internal resource usage and leveraging generative artificial intelligence (genAI) to distinguish between benign and malicious behaviour. The authors design a proof-of-concept for Windows-based computing devices relying on a built-in event tracing mechanism for log collection that is converted into structured data using a graph data structure. The authors extract graph-level features, that is, <i>graph depth, nodes count, number of leaf nodes, node degree statistics, and events count</i> and node-level features (NLF), that is, <i>process start, file create and registry events details</i> for each graph. Further, the authors investigate the use of genAI exploiting a pre-trained large language network—<i>a simple contrastive sentence embedding framework</i> to extract strong features, that is, dense vectors from event graphs. Finally, the authors train a random forest classifier using both the graph-level features and NLF to obtain classification models that are evaluated on a collected dataset containing one thousand benign and malicious samples achieving accuracy up to 99.25%.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"10 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143362801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Winning the battle with cyber risk identification tools in industrial control systems: A review
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-17 DOI: 10.1049/cps2.12105
Ayo Rotibi, Neetesh Saxena, Pete Burnap

The modern Industrial Control System (ICS) environment now combines information technology (IT), operational technology, and physical processes. This digital transformation enhances operational efficiency, service quality, and physical system capabilities enabling systems to measure and control the physical world. However, it also exposes ICS to new and evolving cybersecurity threats that were once confined to the IT domain. As a result, identifying cyber risks in ICS has become more critical, leading to the development of new methods and tools to tackle these emerging threats. This study reviews some of the latest tools for cyber-risk identification in ICS. It empirically analyses each tool based on specific attributes: focus, application domain, core risk management concepts, and how they address current cybersecurity concerns in ICS.

{"title":"Winning the battle with cyber risk identification tools in industrial control systems: A review","authors":"Ayo Rotibi,&nbsp;Neetesh Saxena,&nbsp;Pete Burnap","doi":"10.1049/cps2.12105","DOIUrl":"https://doi.org/10.1049/cps2.12105","url":null,"abstract":"<p>The modern Industrial Control System (ICS) environment now combines information technology (IT), operational technology, and physical processes. This digital transformation enhances operational efficiency, service quality, and physical system capabilities enabling systems to measure and control the physical world. However, it also exposes ICS to new and evolving cybersecurity threats that were once confined to the IT domain. As a result, identifying cyber risks in ICS has become more critical, leading to the development of new methods and tools to tackle these emerging threats. This study reviews some of the latest tools for cyber-risk identification in ICS. It empirically analyses each tool based on specific attributes: focus, application domain, core risk management concepts, and how they address current cybersecurity concerns in ICS.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"350-365"},"PeriodicalIF":1.7,"publicationDate":"2024-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12105","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143252763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Cyber-Physical Systems: Theory and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1