2,191 research outputs found

    HADES: a Hybrid Anomaly Detection System for Large-Scale Cyber-Physical Systems

    Get PDF
    Smart cities rely on large-scale heterogeneous distributed systems known as Cyber-Physical Systems (CPS). Information systems based on CPS typically analyse a massive amount of data collected from various data sources that operate under noisy and dynamic conditions. How to determine the quality and reliability of such data is an open research problem that concerns the overall system safety, reliability and security. Our research goal is to tackle the challenge of real-time data quality assessment for large-scale CPS applications with a hybrid anomaly detection system. In this paper we describe the architecture of HADES, our Hybrid Anomaly DEtection System for sensors data monitoring, storage, processing, analysis, and management. Such data will be filtered with correlation-based outlier detection techniques, and then processed by predictive analytics for anomaly detection

    ๋ฌด์„  ํ†ต์‹  ๊ธฐ๋ฐ˜์˜ ์Šค๋งˆํŠธ ๊ด€๊ฐœ ๋ชจ๋‹ˆํ„ฐ๋ง ์‹œ์Šคํ…œ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ๊ธฐ๊ณ„๊ณตํ•™๋ถ€, 2020. 8. ์•ˆ์„ฑํ›ˆ.๋†์—…์€ ๊ฐœ๋ฐœ ๋„์ƒ๊ตญ๋“ค์˜ ๊ฒฝ์ œ์  ์ค‘์ถ”์ž„์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ๋Œ€๋ถ€๋ถ„์˜ ๊ฐœ๋ฐœ ๋„์ƒ๊ตญ์—์„œ๋Š” ์ž๋™ํ™”๋œ ์žฅ๋น„๋‚˜ ๋ฐ์ดํ„ฐ ๋ชจ๋‹ˆํ„ฐ๋ง ๋“ฑ์˜ ์ง€๋Šฅํ˜• ์‹œ์Šคํ…œ์ด ๊ฑฐ์˜ ์ ์šฉ๋˜์ง€ ๋ชปํ•œ ์ƒํƒœ์—์„œ ์ธ๋ ฅ์— ์˜ํ•ด ๋†์—…์˜ ๋ชจ๋“  ๊ณผ์ •์„ ์ˆ˜ํ–‰ํ•˜๊ณ  ์žˆ๋‹ค. ๊ด€๊ฐœ๋Š” ๋†์ž‘๋ฌผ์˜ ์ƒ์‚ฐ์„ฑ์— ๊ฒฐ์ •์  ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ํ•„์ˆ˜์ ์ธ ๋†์—… ๊ณต์ •์ค‘ ํ•˜๋‚˜๋กœ์„œ, ์—ฐ์ค‘ ๊ฐ•์šฐ๋Ÿ‰์˜ ๋ณ€๋™์— ๋Œ€ํ•œ ๋Œ€์‘์„ ์œ„ํ•˜์—ฌ ๋Œ€๋ถ€๋ถ„์˜ ๋†์ดŒ์ง€์—ญ์—๋Š” ๋†์—…์šฉ์ˆ˜ ๊ด€๊ฐœ ์‹œ์Šคํ…œ์˜ ๊ตฌ์ถ•์„ ์œ„ํ•ด ๋…ธ๋ ฅํ•˜๊ณ  ์žˆ๋‹ค. ํ•˜์ง€๋งŒ, ์ด๋Ÿฌํ•œ ์ธ๋ ฅ์— ์˜ํ•œ ๋†์—… ๋ฐฉ๋ฒ•์—์„œ์˜ ๊ด€๊ฐœ ์‹œ์Šคํ…œ์€ ์Šค๋งˆํŠธ ์„ผ์„œ๋ฅผ ์ด์šฉํ•œ ๋ชจ๋‹ˆํ„ฐ๋ง ๋ฐ ์ œ์–ด ๋“ฑ์˜ ๊ธฐ์ˆ ์  ์š”์†Œ๊ฐ€ ์ ์šฉ๋˜์ง€ ๋ชปํ•˜์—ฌ ํšจ์œจ์ ์ธ ์ˆ˜์ž์›์˜ ํ™œ์šฉ์ด ์ œํ•œ๋˜๊ณ  ์ด๋กœ ์ธํ•ด ๋†์ž‘๋ฌผ์˜ ์ƒ์‚ฐ์„ฑ ๋˜ํ•œ ๋‚ฎ์€ ์‹ค์ •์ด๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ๊ฐœ๋ฐœ ๋„์ƒ๊ตญ์˜ ๋†์ดŒ ์ง€์—ญ์—์„œ ์ ์šฉ ๊ฐ€๋Šฅํ•œ ๋ฌด์„ ํ†ต์‹ (RF: Radio Frequency) ๊ธฐ๋ฐ˜์˜ ์Šค๋งˆํŠธ ๊ด€๊ฐœ ๋ชจ๋‹ˆํ„ฐ๋ง ์‹œ์Šคํ…œ ๋ฐ ์š”๊ธˆ ์„ ๋ถˆ ์‹œ์Šคํ…œ์„ ์ œ์•ˆํ•œ๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋Š” ํƒ„์ž๋‹ˆ์•„ ์•„๋ฃจ์ƒค(Arusha) ์ง€์—ญ์˜ ์‘๊ตฌ๋ฃจ๋„ํ† (Ngurudoto) ๋งˆ์„์„ ๋Œ€์ƒ์œผ๋กœ ์ˆ˜ํ–‰๋˜์—ˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ ์ œ์•ˆํ•˜๋Š” ์‹œ์Šคํ…œ์€ ๊ธฐ์ƒ ๋ฐ์ดํ„ฐ์™€ ํ† ์–‘ ์ˆ˜๋ถ„ ๋ฐ์ดํ„ฐ๋ฅผ ํ•˜์ด๋ธŒ๋ฆฌ๋“œ๋กœ ๋ถ„์„ํ•˜์—ฌ ๋†์—… ์šฉ์ˆ˜์˜ ์†Œ์š”๋ฅผ ๋ชจ๋‹ˆํ„ฐ๋งํ•œ๋‹ค. ํ•˜๋“œ์›จ์–ด ์‹œ์Šคํ…œ์€ ๊ธฐ์ƒ ์ธก์ • ์ปจํŠธ๋กค๋Ÿฌ, ํ† ์–‘ ์ˆ˜๋ถ„ ์„ผ์„œ, ์ˆ˜๋ฅ˜ ์„ผ์„œ, ์†”๋ ˆ๋…ธ์ด๋“œ ๋ฐธ๋ธŒ ๋ฐ ์š”๊ธˆ ์„ ๋ถˆ ์‹œ์Šคํ…œ ๋“ฑ์œผ๋กœ ๊ตฌ์„ฑ๋œ๋‹ค. ์‹œ์Šคํ…œ์˜ ๊ฐ ์„ผ์„œ๋Š” ๋ฌด์„  ํ†ต์‹ ์„ ํ†ตํ•ด ์„œ๋ฒ„๋กœ ์ˆ˜์ง‘๋œ ๋ฐ์ดํ„ฐ๋ฅผ ์ „์†กํ•˜๋„๋ก ๊ตฌ์ถ•๋˜์—ˆ๋Š”๋ฐ, ์ด๋Ÿฌํ•œ ๋ฌด์„  ํ†ต์‹  ์‹œ์Šคํ…œ ์•„ํ‚คํ…์ฒ˜๋Š” ์ธํ„ฐ๋„ท์˜ ์šด์šฉ์ด ์ œํ•œ๋˜๋Š” ๋„คํŠธ์›Œํฌ ์˜ค์ง€ ์ง€์—ญ์— ์ ํ•ฉํ•˜๋„๋ก ์„ค๊ณ„๋˜์—ˆ๋‹ค. ์ˆ˜์ง‘๋œ ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ๋ถ„์„ ๋ฐ ์˜ˆ์ธก์€ ๋ฐ์ดํ„ฐ ๋ถ„์„ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ํ†ตํ•ด ์ˆ˜ํ–‰๋˜๋Š”๋ฐ, ์ด๋ฅผ ํ†ตํ•˜์—ฌ ๋†์žฅ์— ์šฉ์ˆ˜๋ฅผ ๊ณต๊ธ‰ํ•  ์‹œ๊ธฐ ๋ฐ ์ˆ˜๋Ÿ‰๊ณผ ํ•จ๊ป˜ ์š”๊ตฌ๋˜๋Š” ์ „๋ ฅ๋Ÿ‰์ด ์ž๋™์œผ๋กœ ํŒ๋‹จ๋œ๋‹ค. ํ•œํŽธ, ์„ ๋ถˆ์‹œ์Šคํ…œ์€ ๋ฐ์ดํ„ฐ ๋ถ„์„ ๊ฒฐ๊ณผ์— ๊ธฐ๋ฐ˜ํ•˜์—ฌ ์šฉ์ˆ˜ ์‚ฌ์šฉ์ž๊ฐ€ ์šฉ์ˆ˜๋ฅผ ๊ณต๊ธ‰๋ฐ›๊ธฐ ์ „์— ๋น„์šฉ์„ ์šฐ์„  ์ง€๋ถˆํ•˜๋„๋ก ๊ฐœ๋ฐœ๋˜์—ˆ๋‹ค. ๋ณธ ์‹œ์Šคํ…œ์˜ ๋ชจ๋“  ์„ผ์„œ์—์„œ ์ˆ˜์ง‘๋œ ์ •๋ณด๋Š” ์‹ค์‹œ๊ฐ„์œผ๋กœ ๋ชจ๋‹ˆํ„ฐ๋ง๋˜๋„๋ก ๊ทธ๋ž˜ํ”ฝ ๊ธฐ๋ฐ˜์˜ ์‚ฌ์šฉ์ž ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ํ™œ์šฉํ•˜์—ฌ ์ •๋ณด๋ฅผ ์ œ๊ณตํ•œ๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋ฅผ ํ†ตํ•˜์—ฌ ๊ฐœ๋ฐœ๋œ ๋ฌด์„  ํ†ต์‹  ๊ธฐ๋ฐ˜ ์Šค๋งˆํŠธ ๊ด€๊ฐœ ๋ชจ๋‹ˆํ„ฐ๋ง ์‹œ์Šคํ…œ์€ ์‚ฌ์šฉ์ž ์ค‘์‹ฌ์˜ ํŽธ์˜์„ฑ๊ณผ ๊ฒฝ์ œ์ ์ธ ๊ด€๊ฐœ ๋ฐ ๋ชจ๋‹ˆํ„ฐ๋ง ์‹œ์Šคํ…œ์„ ์ œ๊ณตํ•˜์—ฌ ๊ฐœ๋ฐœ ๋„์ƒ๊ตญ์˜ ๊ฒฝ์ œ์  ๊ธฐ๋ฐ˜์ธ ๋†์—… ๋ถ„์•ผ์˜ ๋ฐœ์ „์— ๊ธ์ •์ ์ธ ์˜ํ–ฅ์„ ๋ฏธ์น ๊ฒƒ์œผ๋กœ ๊ธฐ๋Œ€ํ•œ๋‹ค.Agriculture is the backbone of the economy of most developing countries. In these countries, agriculture or farming is mostly done manually with little integration of machinery, intelligent systems and data monitoring. Irrigation is an essential process that influences crop production. The fluctuating amount of rainfall per year has led to the adaption of irrigation systems in most farms. This manual type of farming has proved to yield fair results, however, due to the absence of smart sensors monitoring methods and control, it has failed to be a better type of farming and thus leading to low harvests and draining water sources. In this paper, we introduce an RF (Radio Frequency) based Smart Irrigation Meter System and a water prepayment system in rural areas of Tanzania. Specifically, Ngurudoto area in Arusha region where it will be used as a case study for data collection. The proposed system is hybrid, comprising of both weather data (evapotranspiration) and soil moisture data. The architecture of the system has on-site weather measurement controllers, soil moisture sensors buried on the ground, water flow sensors, solenoid valve, and a prepayment system. These sensors send data to the server through wireless RF based communication architecture, which is suitable for areas where the internet is not reliable and, it is interpreted and decisions and predictions are made on the data by our data analysis algorithm. The decisions made are, when to automatically irrigate a farm and the amount of water and the power needed. Then, the user has to pay first before being supplied with water. All these sensors and water usage are monitored in real time and displaying the information on a custom built graphical user interface. The RF-based smart irrigation monitoring system has both economical and social impact on the developing countries' societies by introducing a convenient and affordable means of Irrigation system and autonomous monitoring.Chapter 1. Introduction 1 Chapter 2 Background of the study and Literature review 3 1.1.Purpose of Research 17 Chapter 3. Requirements and System Design 21 3.1. Key Components 21 3.1.1. System Architecture 21 3.1.2. The Smart Irrigation Meter 22 3.1.2. Parts of Smart Irrigation Meter 23 3.1.3. The pre-paid system and the monitoring device 26 3.2. The Monitoring Application and Cloud Server. 27 Chapter 4. Experiment Setup 30 4.1. Testing Location 30 4.2. Hardware & Software Setup 31 Chapter 5 Results and Analysis 36 5.1 Optimization and anomaly detection algorithm 36 5.1.1 Dynamic Regression Model 36 5.1.2 Nave classifier algorithm for anomaly detection. 38 Chapter 6. Conclusion 44 References 46 ์ดˆ ๋ก 49Maste

    Synoptic analysis techniques for intrusion detection in wireless networks

    Get PDF
    Current system administrators are missing intrusion alerts hidden by large numbers of false positives. Rather than accumulation more data to identify true alerts, we propose an intrusion detection tool that e?ectively uses select data to provide a picture of ?network health?. Our hypothesis is that by utilizing the data available at both the node and cooperative network levels we can create a synoptic picture of the network providing indications of many intrusions or other network issues. Our major contribution is to provide a revolutionary way to analyze node and network data for patterns, dependence, and e?ects that indicate network issues. We collect node and network data, combine and manipulate it, and tease out information about the state of the network. We present a method based on utilizing the number of packets sent, number of packets received, node reliability, route reliability, and entropy to develop a synoptic picture of the network health in the presence of a sinkhole and a HELLO Flood attacker. This method conserves network throughput and node energy by requiring no additional control messages to be sent between the nodes unless an attacker is suspected. We intend to show that, although the concept of an intrusion detection system is not revolutionary, the method in which we analyze the data for clues about network intrusion and performance is highly innovative

    Guest Editorial Special Issue on: Big Data Analytics in Intelligent Systems

    Get PDF
    The amount of information that is being created, every day, is quickly growing. As such, it is now more common than ever to deal with extremely large datasets. As systems develop and become more intelligent and adaptive, analysing their behaviour is a challenge. The heterogeneity, volume and speed of data generation are increasing rapidly. This is further exacerbated by the use of wireless networks, sensors, smartphones and the Internet. Such systems are capable of generating a phenomenal amount of information and the need to analyse their behaviour, to detect security anomalies or predict future demands for example, is becoming harder. Furthermore, securing such systems is a challenge. As threats evolve, so should security measures develop and adopt increasingly intelligent security techniques. Adaptive systems must be employed and existing methods built upon to provide well-structured defence in depth. Despite the clear need to develop effective protection methods, the task is a difficult one, as there are significant weaknesses in the existing security currently in place. Consequently, this special issue of the Journal of Computer Sciences and Applications discusses big data analytics in intelligent systems. The specific topics of discussion include the Internet of Things, Web Services, Cloud Computing, Security and Interconnected Systems

    Utilization of Internet of Things and wireless sensor networks for sustainable smallholder agriculture

    Get PDF
    Agriculture is the economyโ€™s backbone for most developing countries. Most of these countries suffer from insufficient agricultural production. The availability of real-time, reliable and farm-specific information may significantly contribute to more sufficient and sustained production. Typically, such information is usually fragmented and often does fit one-on-one with the farm or farm plot. Automated, precise and affordable data collection and dissemination tools are vital to bring such information to these levels. The tools must address details of spatial and temporal variability. The Internet of Things (IoT) and wireless sensor networks (WSNs) are useful technology in this respect. This paper investigates the usability of IoT and WSN for smallholder agriculture applications. An in-depth qualitative and quantitative analysis of relevant work over the past decade was conducted. We explore the type and purpose of agricultural parameters, study and describe available resources, needed skills and technological requirements that allow sustained deployment of IoT and WSN technology. Our findings reveal significant gaps in utilization of the technology in the context of smallholder farm practices caused by social, economic, infrastructural and technological barriers. We also identify a significant future opportunity to design and implement affordable and reliable data acquisition tools and frameworks, with a possible integration of citizen science

    Survivability modeling for cyber-physical systems subject to data corruption

    Get PDF
    Cyber-physical critical infrastructures are created when traditional physical infrastructure is supplemented with advanced monitoring, control, computing, and communication capability. More intelligent decision support and improved efficacy, dependability, and security are expected. Quantitative models and evaluation methods are required for determining the extent to which a cyber-physical infrastructure improves on its physical predecessors. It is essential that these models reflect both cyber and physical aspects of operation and failure. In this dissertation, we propose quantitative models for dependability attributes, in particular, survivability, of cyber-physical systems. Any malfunction or security breach, whether cyber or physical, that causes the system operation to depart from specifications will affect these dependability attributes. Our focus is on data corruption, which compromises decision support -- the fundamental role played by cyber infrastructure. The first research contribution of this work is a Petri net model for information exchange in cyber-physical systems, which facilitates i) evaluation of the extent of data corruption at a given time, and ii) illuminates the service degradation caused by propagation of corrupt data through the cyber infrastructure. In the second research contribution, we propose metrics and an evaluation method for survivability, which captures the extent of functionality retained by a system after a disruptive event. We illustrate the application of our methods through case studies on smart grids, intelligent water distribution networks, and intelligent transportation systems. Data, cyber infrastructure, and intelligent control are part and parcel of nearly every critical infrastructure that underpins daily life in developed countries. Our work provides means for quantifying and predicting the service degradation caused when cyber infrastructure fails to serve its intended purpose. It can also serve as the foundation for efforts to fortify critical systems and mitigate inevitable failures --Abstract, page iii

    D5.1 SHM digital twin requirements for residential, industrial buildings and bridges

    Get PDF
    This deliverable presents a report of the needs for structural control on buildings (initial imperfections, deflections at service, stability, rheology) and on bridges (vibrations, modal shapes, deflections, stresses) based on state-of-the-art image-based and sensor-based techniques. To this end, the deliverable identifies and describes strategies that encompass state-of-the-art instrumentation and control for infrastructures (SHM technologies).Objectius de Desenvolupament Sostenible::8 - Treball Decent i Creixement EconรฒmicObjectius de Desenvolupament Sostenible::9 - Indรบstria, Innovaciรณ i InfraestructuraPreprin
    • โ€ฆ
    corecore