首页 > 最新文献

International Journal of Critical Infrastructure Protection最新文献

英文 中文
Semi-asynchronous federated learning-based privacy-preserving intrusion detection for advanced metering infrastructure 基于半异步联邦学习的高级计量基础设施隐私保护入侵检测
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-06 DOI: 10.1016/j.ijcip.2025.100742
Zhuoqun Xia , Hongmei Zhou , Zhenzhen Hu , Qisheng Jiang , Kaixin Zhou
The emergence of smart grid brings great convenience to users and power companies, but also brings many new problems, among which the most prominent one is network attack security. Although federated learning works well in dealing with smart grid network attacks, it suffers from gradient leakage, client node failure and a single type of training model. Therefore, this paper proposes a semi-asynchronous federated learning-based privacy-preserving intrusion detection for advanced metering infrastructure (AMI). First, we design a hierarchical federated learning framework based on chained secure multiparty computing, which allows concentrators to collaboratively train models to protect local gradients. Second, we adapt the framework to the AMI network structure characteristics, and design a semi-asynchronous model distribution protocol. Finally, we build an ensemble model based on temporal convolutional network and gated recurrent unit (TCN-GRU) to detect AMI network attacks. The experimental results show that the proposed method can achieve 99.23% accuracy than existing methods.
智能电网的出现在给用户和电力公司带来极大便利的同时,也带来了许多新的问题,其中最突出的是网络攻击安全问题。尽管联邦学习在处理智能电网网络攻击方面效果良好,但它存在梯度泄漏、客户端节点故障和单一类型的训练模型等问题。为此,本文提出了一种基于半异步联邦学习的高级计量基础设施(AMI)隐私保护入侵检测方法。首先,我们设计了一个基于链式安全多方计算的分层联邦学习框架,该框架允许集中器协同训练模型以保护局部梯度。其次,根据AMI网络的结构特点,设计了半异步模型分布协议。最后,我们建立了一个基于时间卷积网络和门控循环单元(TCN-GRU)的集成模型来检测AMI网络攻击。实验结果表明,该方法与现有方法相比,准确率达到99.23%。
{"title":"Semi-asynchronous federated learning-based privacy-preserving intrusion detection for advanced metering infrastructure","authors":"Zhuoqun Xia ,&nbsp;Hongmei Zhou ,&nbsp;Zhenzhen Hu ,&nbsp;Qisheng Jiang ,&nbsp;Kaixin Zhou","doi":"10.1016/j.ijcip.2025.100742","DOIUrl":"10.1016/j.ijcip.2025.100742","url":null,"abstract":"<div><div>The emergence of smart grid brings great convenience to users and power companies, but also brings many new problems, among which the most prominent one is network attack security. Although federated learning works well in dealing with smart grid network attacks, it suffers from gradient leakage, client node failure and a single type of training model. Therefore, this paper proposes a semi-asynchronous federated learning-based privacy-preserving intrusion detection for advanced metering infrastructure (AMI). First, we design a hierarchical federated learning framework based on chained secure multiparty computing, which allows concentrators to collaboratively train models to protect local gradients. Second, we adapt the framework to the AMI network structure characteristics, and design a semi-asynchronous model distribution protocol. Finally, we build an ensemble model based on temporal convolutional network and gated recurrent unit (TCN-GRU) to detect AMI network attacks. The experimental results show that the proposed method can achieve 99.23% accuracy than existing methods.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"49 ","pages":"Article 100742"},"PeriodicalIF":4.1,"publicationDate":"2025-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143464781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling flood propagation and cascading failures in interdependent transportation and stormwater networks 在相互依赖的运输和雨水网络中模拟洪水传播和级联故障
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-16 DOI: 10.1016/j.ijcip.2025.100741
H M Imran Kays, Arif Mohaimin Sadri, K.K. "Muralee" Muraleetharan, P. Scott Harvey, Gerald A. Miller
This study addresses the challenge of modeling flood propagation and cascading failures in geographically interdependent transportation and stormwater systems, filling a critical gap in the literature by effectively capturing the temporal progression and spatial distribution of failures in interdependent systems. We developed a contagion-based Susceptible-Exposed-Flooded-Recovered (SEFR) model to monitor flood propagation dynamics within these interconnected systems. We established a spatial interdependency threshold for transportation and stormwater systems using a multilayer network representation and incorporated the state-of-the-art Hydrologic Engineering Center's River Analysis System (HEC-RAS) to generate reliable flood data. The SEFR model combines the topological characteristics of the multilayer network with simulated flood data to accurately model the propagation of flood damage and cascading failures. Focusing on Norman, Oklahoma, we calibrated the SEFR model using the HEC-RAS 2D flood simulation data for a major precipitation event on July 27, 2021. Results demonstrate the SEFR model's ability to identify the spatiotemporal variations in flood propagation, highlighting critical infrastructure components at risk, including specific road segments and stormwater system elements vulnerable to cascading failures during flooding events. The findings provide new insights into interdependent system resilience and inform intervention strategies to mitigate adverse flooding impacts, enhancing the robustness of critical infrastructure against natural disasters.
本研究解决了在地理上相互依赖的运输和雨水系统中洪水传播和级联故障建模的挑战,通过有效地捕获相互依赖系统中故障的时间进展和空间分布,填补了文献中的一个关键空白。我们开发了一个基于传染性的易感-暴露-洪水-恢复(SEFR)模型来监测这些相互关联系统中的洪水传播动态。我们使用多层网络表示建立了交通和雨水系统的空间相互依赖阈值,并结合了最先进的水文工程中心的河流分析系统(HEC-RAS)来生成可靠的洪水数据。SEFR模型将多层网络的拓扑特征与洪水模拟数据相结合,准确地模拟了洪水破坏和级联破坏的传播过程。以俄克拉荷马的诺曼为研究对象,我们使用HEC-RAS 2D洪水模拟数据校准了SEFR模型,模拟了2021年7月27日的一次大降水事件。结果表明,SEFR模型能够识别洪水传播的时空变化,突出显示处于风险中的关键基础设施组成部分,包括在洪水事件中容易发生级联故障的特定路段和雨水系统要素。这些发现为相互依赖的系统恢复力提供了新的见解,并为减轻不利洪水影响的干预策略提供了信息,增强了关键基础设施抵御自然灾害的稳健性。
{"title":"Modeling flood propagation and cascading failures in interdependent transportation and stormwater networks","authors":"H M Imran Kays,&nbsp;Arif Mohaimin Sadri,&nbsp;K.K. \"Muralee\" Muraleetharan,&nbsp;P. Scott Harvey,&nbsp;Gerald A. Miller","doi":"10.1016/j.ijcip.2025.100741","DOIUrl":"10.1016/j.ijcip.2025.100741","url":null,"abstract":"<div><div>This study addresses the challenge of modeling flood propagation and cascading failures in geographically interdependent transportation and stormwater systems, filling a critical gap in the literature by effectively capturing the temporal progression and spatial distribution of failures in interdependent systems. We developed a contagion-based Susceptible-Exposed-Flooded-Recovered (SEFR) model to monitor flood propagation dynamics within these interconnected systems. We established a spatial interdependency threshold for transportation and stormwater systems using a multilayer network representation and incorporated the state-of-the-art Hydrologic Engineering Center's River Analysis System (HEC-RAS) to generate reliable flood data. The SEFR model combines the topological characteristics of the multilayer network with simulated flood data to accurately model the propagation of flood damage and cascading failures. Focusing on Norman, Oklahoma, we calibrated the SEFR model using the HEC-RAS 2D flood simulation data for a major precipitation event on July 27, 2021. Results demonstrate the SEFR model's ability to identify the spatiotemporal variations in flood propagation, highlighting critical infrastructure components at risk, including specific road segments and stormwater system elements vulnerable to cascading failures during flooding events. The findings provide new insights into interdependent system resilience and inform intervention strategies to mitigate adverse flooding impacts, enhancing the robustness of critical infrastructure against natural disasters.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100741"},"PeriodicalIF":4.1,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OptAML: Optimized adversarial machine learning on water treatment and distribution systems OptAML:在水处理和分配系统上优化的对抗性机器学习
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-13 DOI: 10.1016/j.ijcip.2025.100740
Mustafa Sinasi Ayas , Enis Kara , Selen Ayas , Ali Kivanc Sahin
This research presents the optimized adversarial machine learning framework, OptAML, which is developed for use in water distribution and treatment systems. In consideration of the physical invariants of these systems, the OptAML generates adversarial samples capable of deceiving a hybrid convolutional neural network-long short-term memory network model. The efficacy of the framework is assessed using the Secure Water Treatment (SWaT) and Water Distribution (WADI) datasets. The findings demonstrate that OptAML is capable of effectively evading rule checkers and significantly reducing the accuracy of anomaly detection frameworks in both systems. Additionally, the study investigates a defense mechanism that demonstrates enhanced robustness against these adversarial attacks and is based on adversarial training. Our results underscore the necessity for robust and flexible protection tactics and highlight the shortcomings of the machine learning-based anomaly detection systems for critical infrastructure that are currently in place.
本研究提出了优化的对抗性机器学习框架OptAML,该框架是为水分配和处理系统而开发的。考虑到这些系统的物理不变性,OptAML生成了能够欺骗混合卷积神经网络-长短期记忆网络模型的对抗性样本。使用安全水处理(SWaT)和水分配(WADI)数据集评估该框架的有效性。结果表明,OptAML能够有效地避开规则检查器,并显著降低两个系统中异常检测框架的准确性。此外,该研究还研究了一种基于对抗性训练的防御机制,该机制展示了对这些对抗性攻击的增强鲁棒性。我们的研究结果强调了强大而灵活的保护策略的必要性,并强调了目前用于关键基础设施的基于机器学习的异常检测系统的缺点。
{"title":"OptAML: Optimized adversarial machine learning on water treatment and distribution systems","authors":"Mustafa Sinasi Ayas ,&nbsp;Enis Kara ,&nbsp;Selen Ayas ,&nbsp;Ali Kivanc Sahin","doi":"10.1016/j.ijcip.2025.100740","DOIUrl":"10.1016/j.ijcip.2025.100740","url":null,"abstract":"<div><div>This research presents the optimized adversarial machine learning framework, OptAML, which is developed for use in water distribution and treatment systems. In consideration of the physical invariants of these systems, the OptAML generates adversarial samples capable of deceiving a hybrid convolutional neural network-long short-term memory network model. The efficacy of the framework is assessed using the Secure Water Treatment (SWaT) and Water Distribution (WADI) datasets. The findings demonstrate that OptAML is capable of effectively evading rule checkers and significantly reducing the accuracy of anomaly detection frameworks in both systems. Additionally, the study investigates a defense mechanism that demonstrates enhanced robustness against these adversarial attacks and is based on adversarial training. Our results underscore the necessity for robust and flexible protection tactics and highlight the shortcomings of the machine learning-based anomaly detection systems for critical infrastructure that are currently in place.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100740"},"PeriodicalIF":4.1,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial immunity-based energy theft detection for advanced metering infrastructures 基于人工免疫的先进计量基础设施能源盗窃检测
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-09 DOI: 10.1016/j.ijcip.2025.100739
Jie Fu , Chengxi Yang , Yuxuan Liu , Kunsan Zhang , Jiaqi Li , Beibei Li
Advanced Metering Infrastructure (AMI) is envisioned to enable smart energy management and consumption while ensuring the integrity of real energy consumption data. However, existing smart meters, gateways, and communication channels are usually weakly protected, often opening a huge door for data eavesdroppers who may be easily to further construct energy thefts. Although some energy theft detection schemes have already been reported in the literature, they often fail to take into account the dense data distribution characteristics of energy consumption data, resulting in compromised detection performance. To this end, we in this paper propose a novel arTificial IMmune based Energy theft Detection (TIMED) scheme, which can effectively identify five types of energy thefts. Specifically, we first develop an energy consumption data pre-processing method, which can effectively reduce the dimensionality of raw energy consumption data to facilitate the data analyzing efficiency. Second, we design a center-distance-based energy theft detector generation method to create high-quality detectors with low elimination rates. Last, we devise a nonself-based hole repair method for energy theft detectors, which can further reduce the false negative alarms. Extensive experiments on a real public AMI dataset demonstrate that the proposed TIMED scheme is highly effective in identifying pulse attacks, scaling attacks, ramping attacks, random attacks, and smooth-curve attacks. The results show that TIMED outperforms many existing machine learning and traditional artificial immunity-based energy theft detection methods.
先进计量基础设施(AMI)旨在实现智能能源管理和消费,同时确保真实能源消耗数据的完整性。然而,现有的智能电表、网关和通信通道通常保护薄弱,往往为数据窃听者打开了巨大的大门,他们可能很容易进一步构建能源盗窃。虽然文献中已经报道了一些能源盗窃检测方案,但它们往往没有考虑到能耗数据的密集数据分布特征,导致检测性能下降。为此,本文提出了一种新的基于人工免疫的能量盗窃检测(TIMED)方案,该方案可以有效识别五种类型的能量盗窃。具体而言,我们首先开发了一种能耗数据预处理方法,该方法可以有效地降低原始能耗数据的维数,从而提高数据分析的效率。其次,我们设计了一种基于中心距离的能量盗窃探测器生成方法,以创建低淘汰率的高质量探测器。最后,我们设计了一种非自基的能量盗窃探测器孔洞修复方法,可以进一步减少误报。在真实公共AMI数据集上的大量实验表明,所提出的TIMED方案在识别脉冲攻击、缩放攻击、斜坡攻击、随机攻击和平滑曲线攻击方面具有很高的效率。结果表明,TIMED优于许多现有的机器学习和传统的基于人工免疫的能量盗窃检测方法。
{"title":"Artificial immunity-based energy theft detection for advanced metering infrastructures","authors":"Jie Fu ,&nbsp;Chengxi Yang ,&nbsp;Yuxuan Liu ,&nbsp;Kunsan Zhang ,&nbsp;Jiaqi Li ,&nbsp;Beibei Li","doi":"10.1016/j.ijcip.2025.100739","DOIUrl":"10.1016/j.ijcip.2025.100739","url":null,"abstract":"<div><div>Advanced Metering Infrastructure (AMI) is envisioned to enable smart energy management and consumption while ensuring the integrity of real energy consumption data. However, existing smart meters, gateways, and communication channels are usually weakly protected, often opening a huge door for data eavesdroppers who may be easily to further construct energy thefts. Although some energy theft detection schemes have already been reported in the literature, they often fail to take into account the dense data distribution characteristics of energy consumption data, resulting in compromised detection performance. To this end, we in this paper propose a novel ar<strong>T</strong>ificial <strong>IM</strong>mune based <strong>E</strong>nergy theft <strong>D</strong>etection (TIMED) scheme, which can effectively identify five types of energy thefts. Specifically, we first develop an energy consumption data pre-processing method, which can effectively reduce the dimensionality of raw energy consumption data to facilitate the data analyzing efficiency. Second, we design a center-distance-based energy theft detector generation method to create high-quality detectors with low elimination rates. Last, we devise a nonself-based hole repair method for energy theft detectors, which can further reduce the false negative alarms. Extensive experiments on a real public AMI dataset demonstrate that the proposed TIMED scheme is highly effective in identifying pulse attacks, scaling attacks, ramping attacks, random attacks, and smooth-curve attacks. The results show that TIMED outperforms many existing machine learning and traditional artificial immunity-based energy theft detection methods.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100739"},"PeriodicalIF":4.1,"publicationDate":"2025-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient convolutional neural network based attack detection for smart grid in 5G-IOT 基于卷积神经网络的5G-IOT智能电网攻击检测
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-03 DOI: 10.1016/j.ijcip.2024.100738
Sheeja Rani S , Mostafa F. Shaaban , Abdelfatah Ali
The deployment of 5G networks and IoT devices in smart grid applications provides electricity-generated, distributed, and managed bidirectional transmission of real-time information between utility providers and consumers. However, this increased transmission and confidence in IoT devices also present novel security challenges, since they are vulnerable to malicious attacks. Ensuring robust attack detection mechanisms in 5G-IoT smart grid systems for reliable and efficient power distribution, and early accurate identification of attacks addressed. To solve these concerns, a novel technique called Target Projection Regressed Gradient Convolutional Neural Network (TPRGCNN) is introduced to improve the accuracy of attack detection during data transmission in a 5G-IoT smart grid environment. The TPRGCNN method is combined with feature selection and classification for improving secure data transmission by detecting attacks in 5G-IoT smart grid networks. In the feature selection process, TPRGCNN utilizes the Ruzicka coefficient Dichotonic projection regression method and aims to enhance the accuracy of attack detection while minimizing time complexity. Then selected significant features are fed into Jaspen’s correlative stochastic gradient convolutional neural learning classifier for attack detection. Classification indicates whether transmission is normal or an attack in the 5G-IoT smart grid network. The implementation results demonstrate that the proposed TPRGCNN method achieve a 5% of improved attack detection accuracy and 2% improvement in precision, recall, F-score while reducing time complexity and space complexity by 13% and 23% compared to conventional methods.
在智能电网应用中部署5G网络和物联网设备,可在公用事业供应商和消费者之间提供发电、分布式和受管理的实时信息双向传输。然而,物联网设备的传输和信心的增加也带来了新的安全挑战,因为它们很容易受到恶意攻击。确保5G-IoT智能电网系统中强大的攻击检测机制,实现可靠高效的配电,并及早准确识别攻击。为了解决这些问题,引入了一种名为目标投影回归梯度卷积神经网络(TPRGCNN)的新技术,以提高5G-IoT智能电网环境中数据传输过程中攻击检测的准确性。将TPRGCNN方法与特征选择和分类相结合,通过检测5G-IoT智能电网中的攻击,提高数据传输的安全性。在特征选择过程中,TPRGCNN采用Ruzicka系数二分性投影回归方法,旨在提高攻击检测的准确性,同时最小化时间复杂度。然后将选取的显著特征输入Jaspen相关随机梯度卷积神经学习分类器进行攻击检测。分类是指在5G-IoT智能电网中传输是正常还是受到攻击。实施结果表明,与传统方法相比,提出的TPRGCNN方法的攻击检测准确率提高了5%,精度、召回率、f分数提高了2%,时间复杂度和空间复杂度分别降低了13%和23%。
{"title":"An efficient convolutional neural network based attack detection for smart grid in 5G-IOT","authors":"Sheeja Rani S ,&nbsp;Mostafa F. Shaaban ,&nbsp;Abdelfatah Ali","doi":"10.1016/j.ijcip.2024.100738","DOIUrl":"10.1016/j.ijcip.2024.100738","url":null,"abstract":"<div><div>The deployment of 5G networks and IoT devices in smart grid applications provides electricity-generated, distributed, and managed bidirectional transmission of real-time information between utility providers and consumers. However, this increased transmission and confidence in IoT devices also present novel security challenges, since they are vulnerable to malicious attacks. Ensuring robust attack detection mechanisms in 5G-IoT smart grid systems for reliable and efficient power distribution, and early accurate identification of attacks addressed. To solve these concerns, a novel technique called Target Projection Regressed Gradient Convolutional Neural Network (TPRGCNN) is introduced to improve the accuracy of attack detection during data transmission in a 5G-IoT smart grid environment. The TPRGCNN method is combined with feature selection and classification for improving secure data transmission by detecting attacks in 5G-IoT smart grid networks. In the feature selection process, TPRGCNN utilizes the Ruzicka coefficient Dichotonic projection regression method and aims to enhance the accuracy of attack detection while minimizing time complexity. Then selected significant features are fed into Jaspen’s correlative stochastic gradient convolutional neural learning classifier for attack detection. Classification indicates whether transmission is normal or an attack in the 5G-IoT smart grid network. The implementation results demonstrate that the proposed TPRGCNN method achieve a 5% of improved attack detection accuracy and 2% improvement in precision, recall, F-score while reducing time complexity and space complexity by 13% and 23% compared to conventional methods.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100738"},"PeriodicalIF":4.1,"publicationDate":"2025-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CABBA: Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B CABBA: ADS-B兼容的认证带宽高效广播协议
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-07 DOI: 10.1016/j.ijcip.2024.100728
Mikaëla Ngamboé , Xiao Niu , Benoit Joly , Steven P. Biegler , Paul Berthier , Rémi Benito , Greg Rice , José M. Fernandez , Gabriela Nicolescu
The Automatic Dependent Surveillance-Broadcast (ADS-B) is a surveillance technology mandated in many airspaces. It improves safety, increases efficiency and reduces air traffic congestion by broadcasting aircraft navigation data. Yet, ADS-B is vulnerable to spoofing attacks as it lacks mechanisms to ensure the integrity and authenticity of the data being supplied. None of the existing cryptographic solutions fully meet the backward compatibility and bandwidth preservation requirements of the standard. Hence, we propose the Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B (CABBA), an improved approach that integrates TESLA, phase-overlay modulation techniques and certificate-based PKI. As a result, entity authentication, data origin authentication, and data integrity are the security services that CABBA offers. To assess compliance with the standard, we designed an SDR-based implementation of CABBA and performed backward compatibility tests on commercial and general aviation (GA) ADS-B in receivers. Besides, we calculated the 1090ES band’s activity factor and analyzed the channel occupancy rate according to ITU-R SM.2256-1 recommendation. Also, we performed a bit error rate analysis of CABBA messages. The results suggest that CABBA is backward compatible, does not incur significant communication overhead, and has an error rate that is acceptable for Eb/No values above 14 dB.
广播自动相关监视(ADS-B)是许多空域强制使用的监视技术。它通过广播飞机导航数据提高了安全性,提高了效率,减少了空中交通拥堵。然而,ADS-B很容易受到欺骗攻击,因为它缺乏机制来确保所提供数据的完整性和真实性。现有的加密解决方案都不能完全满足该标准的向后兼容性和带宽保存要求。因此,我们提出了用于ADS-B的兼容认证带宽高效广播协议(CABBA),这是一种集成了TESLA、相位覆盖调制技术和基于证书的PKI的改进方法。因此,实体身份验证、数据源身份验证和数据完整性是CABBA提供的安全服务。为了评估是否符合标准,我们设计了一个基于sdr的CABBA实现,并对商用和通用航空(GA)接收机中的ADS-B进行了向后兼容性测试。此外,我们根据ITU-R SM.2256-1建议计算了1090ES频段的活度因子,并分析了信道占用率。此外,我们还对CABBA消息进行了误码率分析。结果表明,CABBA是向后兼容的,不会产生显著的通信开销,并且在Eb/No值高于14 dB时具有可接受的错误率。
{"title":"CABBA: Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B","authors":"Mikaëla Ngamboé ,&nbsp;Xiao Niu ,&nbsp;Benoit Joly ,&nbsp;Steven P. Biegler ,&nbsp;Paul Berthier ,&nbsp;Rémi Benito ,&nbsp;Greg Rice ,&nbsp;José M. Fernandez ,&nbsp;Gabriela Nicolescu","doi":"10.1016/j.ijcip.2024.100728","DOIUrl":"10.1016/j.ijcip.2024.100728","url":null,"abstract":"<div><div>The Automatic Dependent Surveillance-Broadcast (ADS-B) is a surveillance technology mandated in many airspaces. It improves safety, increases efficiency and reduces air traffic congestion by broadcasting aircraft navigation data. Yet, ADS-B is vulnerable to spoofing attacks as it lacks mechanisms to ensure the integrity and authenticity of the data being supplied. None of the existing cryptographic solutions fully meet the backward compatibility and bandwidth preservation requirements of the standard. Hence, we propose the Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B (CABBA), an improved approach that integrates TESLA, phase-overlay modulation techniques and certificate-based PKI. As a result, entity authentication, data origin authentication, and data integrity are the security services that CABBA offers. To assess compliance with the standard, we designed an SDR-based implementation of CABBA and performed backward compatibility tests on commercial and general aviation (GA) ADS-B in receivers. Besides, we calculated the 1090ES band’s activity factor and analyzed the channel occupancy rate according to ITU-R SM.2256-1 recommendation. Also, we performed a bit error rate analysis of CABBA messages. The results suggest that CABBA is backward compatible, does not incur significant communication overhead, and has an error rate that is acceptable for Eb/No values above 14 dB.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100728"},"PeriodicalIF":4.1,"publicationDate":"2024-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems 超越僵尸网络:工业控制系统中的自主固件僵尸攻击
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-07 DOI: 10.1016/j.ijcip.2024.100729
Seyed Ali Alavi, Hamed Pourvali Moghadam, Amir Hossein Jahangir
This paper introduces a novel cyberattack vector called the ”Autonomous Firmware Zombie Attack.” Unlike traditional zombie attacks that rely on botnets and direct network control, this method enables attackers to covertly modify the firmware of substation Intelligent Electronic Devices (IEDs) and other firmware-based appliances, including critical industrial equipment, without requiring an active network connection, leaving minimal trace and making an offensive attack with only one infected device instead of a set of multiple devices in botnets. Unlike conventional cyber threats, this method allows attackers to manipulate devices to cause substantial damage while leaving minimal trace, thus evading traditional detection techniques. This study demonstrates the potential of the Autonomous Firmware Zombie Attack (AFZA), which causes substantial damage while evading conventional detection techniques. We first run such an attack on a series of IEDs as proof of concept for this issue. Then, we compare this approach to traditional remote control attacks, highlighting its unique advantages and implications for industrial control system security. This research underscores the critical need for a robust cybersecurity framework tailored to industrial control systems and advances our understanding of the complex risk landscape threatening critical infrastructures.
本文介绍了一种称为“自主固件僵尸攻击”的新型网络攻击向量。与依赖僵尸网络和直接网络控制的传统僵尸攻击不同,这种方法使攻击者能够秘密地修改变电站智能电子设备(ied)和其他基于固件的设备(包括关键工业设备)的固件,而不需要活动网络连接,留下最小的痕迹,并且仅对一个受感染设备而不是僵尸网络中的一组多个设备进行攻击。与传统的网络威胁不同,这种方法允许攻击者操纵设备造成重大损害,同时留下最小的痕迹,从而避开传统的检测技术。这项研究证明了自主固件僵尸攻击(AFZA)的潜力,它可以在逃避传统检测技术的同时造成重大损害。我们首先在一系列简易爆炸装置上运行这样的攻击,作为这个问题的概念证明。然后,我们将这种方法与传统的远程控制攻击进行比较,强调其独特的优势和对工业控制系统安全的影响。这项研究强调了对针对工业控制系统量身定制的强大网络安全框架的迫切需求,并提高了我们对威胁关键基础设施的复杂风险格局的理解。
{"title":"Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems","authors":"Seyed Ali Alavi,&nbsp;Hamed Pourvali Moghadam,&nbsp;Amir Hossein Jahangir","doi":"10.1016/j.ijcip.2024.100729","DOIUrl":"10.1016/j.ijcip.2024.100729","url":null,"abstract":"<div><div>This paper introduces a novel cyberattack vector called the ”Autonomous Firmware Zombie Attack.” Unlike traditional zombie attacks that rely on botnets and direct network control, this method enables attackers to covertly modify the firmware of substation Intelligent Electronic Devices (IEDs) and other firmware-based appliances, including critical industrial equipment, without requiring an active network connection, leaving minimal trace and making an offensive attack with only one infected device instead of a set of multiple devices in botnets. Unlike conventional cyber threats, this method allows attackers to manipulate devices to cause substantial damage while leaving minimal trace, thus evading traditional detection techniques. This study demonstrates the potential of the Autonomous Firmware Zombie Attack (AFZA), which causes substantial damage while evading conventional detection techniques. We first run such an attack on a series of IEDs as proof of concept for this issue. Then, we compare this approach to traditional remote control attacks, highlighting its unique advantages and implications for industrial control system security. This research underscores the critical need for a robust cybersecurity framework tailored to industrial control systems and advances our understanding of the complex risk landscape threatening critical infrastructures.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100729"},"PeriodicalIF":4.1,"publicationDate":"2024-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of multi-stage attack and defense mechanisms in smart grids 智能电网多阶段攻防机制仿真
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-05 DOI: 10.1016/j.ijcip.2024.100727
Ömer Sen , Bozhidar Ivanov , Christian Kloos , Christoph Zöll , Philipp Lutat , Martin Henze , Andreas Ulbig , Michael Andres
The power grid is a vital infrastructure in modern society, essential for ensuring public safety and welfare. As it increasingly relies on digital technologies for its operation, it becomes more vulnerable to sophisticated cyber threats. These threats, if successful, could disrupt the grid’s functionality, leading to severe consequences. To mitigate these risks, it is crucial to develop effective protective measures, such as intrusion detection systems and decision support systems, that can detect and respond to cyber attacks. Machine learning methods have shown great promise in this area, but their effectiveness is often limited by the scarcity of high-quality data, primarily due to confidentiality and access issues.
In response to this challenge, our work introduces an advanced simulation environment that replicates the power grid’s infrastructure and communication behavior. This environment enables the simulation of complex, multi-stage cyber attacks and defensive mechanisms, using attack trees to map the attacker’s steps and a game-theoretic approach to model the defender’s response strategies. The primary goal of this simulation framework is to generate a diverse range of realistic attack data that can be used to train machine learning algorithms for detecting and mitigating cyber attacks. Additionally, the environment supports the evaluation of new security technologies, including advanced decision support systems, by providing a controlled and flexible testing platform.
Our simulation environment is designed to be modular and scalable, supporting the integration of new use cases and attack scenarios without relying heavily on external components. It enables the entire process of scenario generation, data modeling, data point mapping, and power flow simulation, along with the depiction of communication traffic, in a coherent process chain. This ensures that all relevant data needed for cyber security investigations, including the interactions between attacker and defender, are captured under consistent conditions and constraints.
The simulation environment also includes a detailed modeling of communication protocols and grid operation management, providing insights into how attacks propagate through the network. The generated data are validated through laboratory tests, ensuring that the simulation reflects real-world conditions. These datasets are used to train machine learning models for intrusion detection and evaluate their performance, specifically focusing on how well they can detect complex attack patterns in power grid operations.
电网是现代社会重要的基础设施,对保障公共安全和社会福利至关重要。随着它越来越依赖数字技术进行操作,它变得更容易受到复杂的网络威胁。这些威胁如果成功,可能会破坏电网的功能,导致严重的后果。为了减轻这些风险,开发有效的保护措施至关重要,例如可以检测和响应网络攻击的入侵检测系统和决策支持系统。机器学习方法在这一领域显示出巨大的前景,但它们的有效性往往受到高质量数据稀缺的限制,主要是由于保密性和访问问题。为了应对这一挑战,我们的工作引入了一种先进的模拟环境,可以复制电网的基础设施和通信行为。这种环境能够模拟复杂的、多阶段的网络攻击和防御机制,使用攻击树来映射攻击者的步骤,并使用博弈论方法来模拟防御者的响应策略。该模拟框架的主要目标是生成各种各样的真实攻击数据,这些数据可用于训练机器学习算法,以检测和减轻网络攻击。此外,该环境通过提供一个可控和灵活的测试平台,支持评估新的安全技术,包括先进的决策支持系统。我们的模拟环境被设计成模块化和可扩展的,支持新用例和攻击场景的集成,而不严重依赖外部组件。它支持场景生成、数据建模、数据点映射和功率流模拟的整个过程,以及通信流量的描述,在一个连贯的过程链中。这确保了在一致的条件和约束下捕获网络安全调查所需的所有相关数据,包括攻击者和防御者之间的交互。仿真环境还包括通信协议和网格操作管理的详细建模,提供了对攻击如何通过网络传播的见解。生成的数据通过实验室测试进行验证,确保模拟反映了现实世界的条件。这些数据集用于训练用于入侵检测的机器学习模型并评估其性能,特别关注它们在电网运行中检测复杂攻击模式的能力。
{"title":"Simulation of multi-stage attack and defense mechanisms in smart grids","authors":"Ömer Sen ,&nbsp;Bozhidar Ivanov ,&nbsp;Christian Kloos ,&nbsp;Christoph Zöll ,&nbsp;Philipp Lutat ,&nbsp;Martin Henze ,&nbsp;Andreas Ulbig ,&nbsp;Michael Andres","doi":"10.1016/j.ijcip.2024.100727","DOIUrl":"10.1016/j.ijcip.2024.100727","url":null,"abstract":"<div><div>The power grid is a vital infrastructure in modern society, essential for ensuring public safety and welfare. As it increasingly relies on digital technologies for its operation, it becomes more vulnerable to sophisticated cyber threats. These threats, if successful, could disrupt the grid’s functionality, leading to severe consequences. To mitigate these risks, it is crucial to develop effective protective measures, such as intrusion detection systems and decision support systems, that can detect and respond to cyber attacks. Machine learning methods have shown great promise in this area, but their effectiveness is often limited by the scarcity of high-quality data, primarily due to confidentiality and access issues.</div><div>In response to this challenge, our work introduces an advanced simulation environment that replicates the power grid’s infrastructure and communication behavior. This environment enables the simulation of complex, multi-stage cyber attacks and defensive mechanisms, using attack trees to map the attacker’s steps and a game-theoretic approach to model the defender’s response strategies. The primary goal of this simulation framework is to generate a diverse range of realistic attack data that can be used to train machine learning algorithms for detecting and mitigating cyber attacks. Additionally, the environment supports the evaluation of new security technologies, including advanced decision support systems, by providing a controlled and flexible testing platform.</div><div>Our simulation environment is designed to be modular and scalable, supporting the integration of new use cases and attack scenarios without relying heavily on external components. It enables the entire process of scenario generation, data modeling, data point mapping, and power flow simulation, along with the depiction of communication traffic, in a coherent process chain. This ensures that all relevant data needed for cyber security investigations, including the interactions between attacker and defender, are captured under consistent conditions and constraints.</div><div>The simulation environment also includes a detailed modeling of communication protocols and grid operation management, providing insights into how attacks propagate through the network. The generated data are validated through laboratory tests, ensuring that the simulation reflects real-world conditions. These datasets are used to train machine learning models for intrusion detection and evaluate their performance, specifically focusing on how well they can detect complex attack patterns in power grid operations.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100727"},"PeriodicalIF":4.1,"publicationDate":"2024-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143168301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical threats vs Cyber threats 物理威胁vs网络威胁
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.1016/S1874-5482(24)00075-1
Roberto Setola
{"title":"Physical threats vs Cyber threats","authors":"Roberto Setola","doi":"10.1016/S1874-5482(24)00075-1","DOIUrl":"10.1016/S1874-5482(24)00075-1","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100734"},"PeriodicalIF":4.1,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143154825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized unmanned aerial vehicle pathway system in disaster resilience network 灾备网络中无人机路径系统的优化
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.1016/j.ijcip.2024.100726
Yi-Wei Ma, Desti Syuhada
After a disaster, the interruption of networks in affected areas is a significant challenge, exacerbated by the malfunction of base stations and the complete absence of network infrastructure. Hence, the objective of this study is to achieve a systematic and well-supported path in the post-disaster system through the optimization of coverage area and the provision of high-quality service. Therefore, this study aims to enhance the extent of coverage and transmission efficiency by considering the specific needs of users to establish a logical and systematic flight path of Unmanned Aerial Vehicles (UAVs) in a post-disaster scenario. This study demonstrates a 12.7 % availability advantage over random methods that do not consider users and only generalize cluster length. This study optimizes the performance of the UAV by adjusting its altitude position best to meet the requirements of its coverage and transmission quality.
灾难发生后,受影响地区的网络中断是一项重大挑战,而基站的故障和网络基础设施的完全缺乏又加剧了这一挑战。因此,本研究的目标是通过优化覆盖区域和提供高质量服务,在灾后系统中实现系统和良好支持的路径。因此,本研究旨在结合用户的具体需求,提高覆盖范围和传输效率,建立灾后场景下无人机的逻辑系统飞行路径。该研究表明,与不考虑用户且仅概括集群长度的随机方法相比,该方法的可用性优势为12.7 %。本研究通过调整无人机的高度位置来优化无人机的性能,以满足其覆盖和传输质量的要求。
{"title":"Optimized unmanned aerial vehicle pathway system in disaster resilience network","authors":"Yi-Wei Ma,&nbsp;Desti Syuhada","doi":"10.1016/j.ijcip.2024.100726","DOIUrl":"10.1016/j.ijcip.2024.100726","url":null,"abstract":"<div><div>After a disaster, the interruption of networks in affected areas is a significant challenge, exacerbated by the malfunction of base stations and the complete absence of network infrastructure. Hence, the objective of this study is to achieve a systematic and well-supported path in the post-disaster system through the optimization of coverage area and the provision of high-quality service. Therefore, this study aims to enhance the extent of coverage and transmission efficiency by considering the specific needs of users to establish a logical and systematic flight path of Unmanned Aerial Vehicles (UAVs) in a post-disaster scenario. This study demonstrates a 12.7 % availability advantage over random methods that do not consider users and only generalize cluster length. This study optimizes the performance of the UAV by adjusting its altitude position best to meet the requirements of its coverage and transmission quality.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100726"},"PeriodicalIF":4.1,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142748486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Critical Infrastructure Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1