A Novel Decentralized Analytical Methodology for Cyber Physical Networks Attack Detection

نویسندگان

چکیده

In many functional implementations of considerable engineering significance, cyber physical solutions have recently been developed where protection and privacy are essential. This led to the recent increase in interest development advanced emerging technology for anomaly intrusion detection. The paper suggests a new frame distributed blind detection by modelling sensor measurements as graph signal using statistical features intrusion. graphic similarity matrices is generated measured data sensors well proximity completely take account underlying network structure. scope collected modelled on random field Gaussian Markov required precision matrix can be determined adjusting called Laplacian matrix. For research statistics, suggested technique based modified Bayesian probability ratio test closed-form expressions derived. end, time analysis actions calculated computing Bhattacharyya distance at consecutive times among measurement distributions. Experiments carried out, evaluated equate efficiency proposed system modern method. findings indicate value better than that offered other existing systems via frame.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review of Attack Detection Scheme for Cyber Physical Security System

Cyber-Physical Systems (CPSs) are characterized by integrating computation and physical processes. The theories and applications of CPSs face the enormous challenges that are (1) general workflow of cyber physical systems, (2) identifying the unique properties of cyber-physical systems and (3) discussing security mechanisms applicable to cyber physical systems. In particular, we analyze and we ...

متن کامل

Local Cyber-physical Attack with Leveraging Detection in Smart Grid

A well-designed attack in the power system can cause an initial failure and then results in large-scale cascade failure. Several works have discussed power system attack through false data injection, line-maintaining attack, and line-removing attack. However, the existing methods need to continuously attack the system for a long time, and, unfortunately, the performance cannot be guaranteed if ...

متن کامل

A survey of Cyber Attack Detection Strategies

Homeland security field deals with diverse subjects, audio processing, video surveillance, image detection, geolocation determination, and cyber attack detection. Audio processing and video surveillance area are significant for public places safety and land border area. However the big threat for homeland security is cyber attacks. Cyber terror attacks and cyber crime attacks may move over virt...

متن کامل

A Novel Sybil Attack Detection Technique for Wireless Sensor Networks

Wireless Sensor Networks (WSNs) are susceptible to Sybil attacks in which malicious node creates a huge number of fake identities in order to gain an excessively high advantage through a Byzantine method. A Sybil node using only one physical device may generate random number of additional node identities and can be used to disrupt normal functioning of the WSN, such as multipath routing which i...

متن کامل

dr0wned - Cyber-Physical Attack with Additive Manufacturing

Additive Manufacturing (AM, or 3D printing) is an emerging manufacturing technology with far-reaching implications. AM is increasingly used to produce functional parts, including components for safety-critical systems. However, AM’s unique capabilities and dependence on computerization raise a concern that an AM generated part could be sabotaged by a cyber-physical attack. In this paper, we dem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Personal Communications

سال: 2021

ISSN: ['1572-834X', '0929-6212']

DOI: https://doi.org/10.1007/s11277-021-08716-5