A Novel Decentralized Analytical Methodology for Cyber Physical Networks Attack Detection
نویسندگان
چکیده
In many functional implementations of considerable engineering significance, cyber physical solutions have recently been developed where protection and privacy are essential. This led to the recent increase in interest development advanced emerging technology for anomaly intrusion detection. The paper suggests a new frame distributed blind detection by modelling sensor measurements as graph signal using statistical features intrusion. graphic similarity matrices is generated measured data sensors well proximity completely take account underlying network structure. scope collected modelled on random field Gaussian Markov required precision matrix can be determined adjusting called Laplacian matrix. For research statistics, suggested technique based modified Bayesian probability ratio test closed-form expressions derived. end, time analysis actions calculated computing Bhattacharyya distance at consecutive times among measurement distributions. Experiments carried out, evaluated equate efficiency proposed system modern method. findings indicate value better than that offered other existing systems via frame.
منابع مشابه
Review of Attack Detection Scheme for Cyber Physical Security System
Cyber-Physical Systems (CPSs) are characterized by integrating computation and physical processes. The theories and applications of CPSs face the enormous challenges that are (1) general workflow of cyber physical systems, (2) identifying the unique properties of cyber-physical systems and (3) discussing security mechanisms applicable to cyber physical systems. In particular, we analyze and we ...
متن کاملLocal Cyber-physical Attack with Leveraging Detection in Smart Grid
A well-designed attack in the power system can cause an initial failure and then results in large-scale cascade failure. Several works have discussed power system attack through false data injection, line-maintaining attack, and line-removing attack. However, the existing methods need to continuously attack the system for a long time, and, unfortunately, the performance cannot be guaranteed if ...
متن کاملA survey of Cyber Attack Detection Strategies
Homeland security field deals with diverse subjects, audio processing, video surveillance, image detection, geolocation determination, and cyber attack detection. Audio processing and video surveillance area are significant for public places safety and land border area. However the big threat for homeland security is cyber attacks. Cyber terror attacks and cyber crime attacks may move over virt...
متن کاملA Novel Sybil Attack Detection Technique for Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are susceptible to Sybil attacks in which malicious node creates a huge number of fake identities in order to gain an excessively high advantage through a Byzantine method. A Sybil node using only one physical device may generate random number of additional node identities and can be used to disrupt normal functioning of the WSN, such as multipath routing which i...
متن کاملdr0wned - Cyber-Physical Attack with Additive Manufacturing
Additive Manufacturing (AM, or 3D printing) is an emerging manufacturing technology with far-reaching implications. AM is increasingly used to produce functional parts, including components for safety-critical systems. However, AM’s unique capabilities and dependence on computerization raise a concern that an AM generated part could be sabotaged by a cyber-physical attack. In this paper, we dem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Personal Communications
سال: 2021
ISSN: ['1572-834X', '0929-6212']
DOI: https://doi.org/10.1007/s11277-021-08716-5