450 research outputs found
Early Detection and Prevention of DDOS attack on VANET
Growing number of vehicles in use has ushered in the service to provide human and resource safety. The present trend calls for the application of technology to automate safety measures in road traffic and since has been known as Intelligent Transport System (ITS). Vehicular Ad hoc Network is like a fork to Mobile Ad hoc Network , where the nodes are mobile vehicles moving in constrained road topology. VANET networks are envisioned to be used in practical ITS systems around the world. A network standard has been developed as Wireless Access In Vehicular Environment (IEEE 802.11p) to be used in VANET which is an amendment to IEEE 802.11 standard. With every new technological applications especially computers and network applications, come new security challenges. Every network in modern day is susceptible to security attacks and VANET is no exception. The most infamous of those attacks is the Distributed Denial of Service Attack which is unavoidable because unlike other security attacks the data packets used in it are legitimate packets. In this thesis work previous solutions are reviewed and a new offensive measure for detection, mitigation and prevention has been propose
Recommended from our members
Capability-based access control for cyber physical systems
Cyber Physical Systems (CPS)
couple digital systems with the physical environment, creating
technical, usability, and economic security challenges beyond those of
information systems. Their distributed and
hierarchical nature, real-time and safety-critical requirements, and limited
resources create new vulnerability classes and severely constrain the security
solution space. This dissertation explores these challenges, focusing on
Industrial Control Systems (ICS), but demonstrating broader applicability to
the whole domain.
We begin by systematising the usability and economic challenges to secure ICS.
We fingerprint and track more than 10\,000 Internet-connected devices over four years and show
the population is growing, continuously-connected, and unpatched. We then
explore adversarial interest in this vulnerable population. We track 150\,000
botnet hosts, sift 70 million underground forum posts, and perform the
largest ICS honeypot study to date to demonstrate that the cybercrime community
has little competence or interest in the domain. We show that the current
heterogeneity, cost, and level of expertise required for large-scale attacks on
ICS are economic deterrents when targets in the IoT domain are
available.
The ICS landscape is changing, however, and we demonstrate the imminent
convergence with the IoT domain as inexpensive hardware, commodity operating
Cyber Physical Systems (CPS) couple digital systems with the physical environment, creating technical, usability, and economic security challenges beyond those of information systems. Their distributed and hierarchical nature, real-time and safety-critical requirements, and limited resources create new vulnerability classes and severely constrain the security solution space. This dissertation explores these challenges, focusing on Industrial Control Systems (ICS), but demonstrating broader applicability to the whole domain.
We begin by systematising the usability and economic challenges to secure ICS. We fingerprint and track more than 10,000 Internet-connected devices over four years and show the population is growing, continuously-connected, and unpatched. We then explore adversarial interest in this vulnerable population. We track 150,000 botnet hosts, sift 70 million underground forum posts, and perform the largest ICS honeypot study to date to demonstrate that the cybercrime community has little competence or interest in the domain. We show that the current heterogeneity, cost, and level of expertise required for large-scale attacks on ICS are economic deterrents when targets in the IoT domain are available.
The ICS landscape is changing, however, and we demonstrate the imminent convergence with the IoT domain as inexpensive hardware, commodity operating systems, and wireless connectivity become standard. Industry's security solution is boundary defence, pushing privilege to firewalls and anomaly detectors; however, this propagates rather than minimises privilege and leaves the hierarchy vulnerable to a single boundary compromise.
In contrast, we propose, implement, and evaluate a security architecture based on distributed capabilities. Specifically, we show that object capabilities, representing physical resources, can be constructed, delegated, and used anywhere in a distributed CPS by composing hardware-enforced architectural capabilities and cryptographic network tokens. Our architecture provides defence-in-depth, minimising privilege at every level of the CPS hierarchy, and both supports and adds integrity protection to legacy CPS protocols. We implement distributed capabilities in robotics and ICS demonstrators, and we show that our architecture adds negligible overhead to realistic integrations and can be implemented without significant modification to existing source code.
In contrast, we propose, implement, and evaluate a security architecture based on distributed capabilities. Specifically, we show that object capabilities, representing physical resources, can be constructed, delegated, and used anywhere in a distributed CPS by composing hardware-enforced architectural capabilities and cryptographic network tokens. Our architecture provides defence-in-depth, minimising privilege at every level of the CPS hierarchy, and both supports and adds integrity protection to legacy CPS protocols. We implement distributed capabilities in robotics and ICS demonstrators, and we show that our architecture adds negligible overhead to realistic integrations and can be implemented without significant modification to existing source code
Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach
The proliferation of unmanned aerial vehicles (UAVs) opens up new
opportunities for on-demand service provisioning anywhere and anytime, but also
exposes UAVs to a variety of cyber threats. Low/medium interaction honeypots
offer a promising lightweight defense for actively protecting mobile Internet
of things, particularly UAV networks. While previous research has primarily
focused on honeypot system design and attack pattern recognition, the incentive
issue for motivating UAV's participation (e.g., sharing trapped attack data in
honeypots) to collaboratively resist distributed and sophisticated attacks
remains unexplored. This paper proposes a novel game-theoretical collaborative
defense approach to address optimal, fair, and feasible incentive design, in
the presence of network dynamics and UAVs' multi-dimensional private
information (e.g., valid defense data (VDD) volume, communication delay, and
UAV cost). Specifically, we first develop a honeypot game between UAVs and the
network operator under both partial and complete information asymmetry
scenarios. The optimal VDD-reward contract design problem with partial
information asymmetry is then solved using a contract-theoretic approach that
ensures budget feasibility, truthfulness, fairness, and computational
efficiency. In addition, under complete information asymmetry, we devise a
distributed reinforcement learning algorithm to dynamically design optimal
contracts for distinct types of UAVs in the time-varying UAV network. Extensive
simulations demonstrate that the proposed scheme can motivate UAV's cooperation
in VDD sharing and improve defensive effectiveness, compared with conventional
schemes.Comment: Accepted Aug. 28, 2023 by IEEE Transactions on Information Forensics
& Security. arXiv admin note: text overlap with arXiv:2209.1381
A Structured Approach to Securing the Connected Car
<p>Vehicles of today have become increasingly dependent on software to handle their functionalities. Updating and maintaining the software in vehicles has therefore become a costly process for the automotive industry. By introducing wireless communications to vehicles, vehicular maintenance can greatly be improved and many other new applications can also be brought to the vehicles. However, the vehicle was not designed with security in mind. Since the vehicle is safety-critical, it is vital that such new remote services do not violate the safety and security requirements of the vehicle. Thus, this thesis presents a general approach to securing the connected car and the usefulness of the approach is demonstrated in a vehicular diagnostics scenario.</p>
<p>The thesis comes in two main parts. In the first part, we address security mechanisms for the connected car. First, a survey of current mechanisms to secure the in-vehicle networks is made. Then, a description of possible communication methods with vehicles is given and a taxonomy of current entities involved in such communication is presented. The taxonomy is organised in actors, vehicle-to-X communications, network paths, and dependability and security attributes. The usefulness of the taxonomy is demonstrated by two examples.</p>
<p>In the second part, we address security with respect to vehicular diagnostics. First, an overall security analysis of the interaction between the connected car and the repair shop is conducted. We find that the most imminent risk in the repair shop is the loss of authentication keys. The loss of such keys allows masquerading attacks against vehicles. To address this problem, we propose a Kerberos-inspired protocol for authentication and authorisation of the diagnostics equipment and a trusted third party is introduced.</p>
<p>To conclude, this thesis shows the value of adopting a structured approach to securing the connected car. The approach has been shown to be useful for identifying threats and countermeasures and thus help improving security.</p
In-Vehicle Data Communication with CAN &Security Monitoring: A Review
Automobiles are now being created with more electronic components for efficient functioning such as Anti Lock Braking system, Adaptive Cruise Control, Traction control system, Airbag, Power Steering etc. managed by networked controllers that include hundreds of ECUs (electronic control units) that can coordinate, control, and monitor loads of internal vehicle components. Each component, such as ABS, TCS (Traction control system), tire pressure monitoring system and telematics system, may communicate with nearby components over the CAN (Controller Area Network) bus, establishing an in-vehicle communication network. These modern automobile system networks intended for safety with minimal consideration for security have drawn the attention of researchers for providing security in CAN. The Paper reviews the behavior and vulnerabilities of CAN within an in-vehicle network including various attacks possible in CAN along with the proposed solutions in the literature with extensive survey on a security promising approach named as IDS (Intrusion detection system)
Classifying resilience approaches for protecting smart grids against cyber threats
Smart grids (SG) draw the attention of cyber attackers due to their vulnerabilities, which are caused by the usage of heterogeneous communication technologies and their distributed nature. While preventing or detecting cyber attacks is a well-studied field of research, making SG more resilient against such threats is a challenging task. This paper provides a classification of the proposed cyber resilience methods against cyber attacks for SG. This classification includes a set of studies that propose cyber-resilient approaches to protect SG and related cyber-physical systems against unforeseen anomalies or deliberate attacks. Each study is briefly analyzed and is associated with the proper cyber resilience technique which is given by the National Institute of Standards and Technology in the Special Publication 800-160. These techniques are also linked to the different states of the typical resilience curve. Consequently, this paper highlights the most critical challenges for achieving cyber resilience, reveals significant cyber resilience aspects that have not been sufficiently considered yet and, finally, proposes scientific areas that should be further researched in order to enhance the cyber resilience of SG.Open Access funding provided thanks to the CRUE-CSIC agreement with Springer Nature. Funding for open access charge: Universidad de Málaga / CBUA
- …