29 research outputs found

    Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems

    Full text link

    Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks

    Get PDF
    Modern power systems have begun integrating synchrophasor technologies into part of daily operations. Given the amount of solutions offered and the maturity rate of application development it is not a matter of "if" but a matter of "when" in regards to these technologies becoming ubiquitous in control centers around the world. While the benefits are numerous, the functionality of operator-level applications can easily be nullified by injection of deceptive data signals disguised as genuine measurements. Such deceptive action is a common precursor to nefarious, often malicious activity. A correlation coefficient characterization and machine learning methodology are proposed to detect and identify injection of spoofed data signals. The proposed method utilizes statistical relationships intrinsic to power system parameters, which are quantified and presented. Several spoofing schemes have been developed to qualitatively and quantitatively demonstrate detection capabilities.Comment: 8 pages, 4 figures, submitted to IEEE Transaction

    Intrusion Detection in Mobile Ad-Hoc Networks using Bayesian Game Methodology

    Get PDF
    The dynamic and distributed nature of MANETs make them vulnerable to various types of attacks like black hole attack, traffic distortion, IP spoofing, DoS attack etc. Malicious nodes can launch attacks against other normal nodes and deteriorate the overall performance of the entire network [1�3]. Unlike in wired networks, there are no fixed checkpoints like router and switches in MANETs, where the Intrusion Detection System (IDS) can be deployed .However, due to limited wireless communication range and node mobility, nodes in MANET must cooperate with each other to provide networking services among themselves. Therefore, each node in a MANET acts both as a host and a router. Present Intrusion Detection Systems (IDSs) for MANETs require continuous monitoring which leads to rapid depletion of a node�s battery life. To avoid this issue we propose a system to prevent intrusion in MANET using Bayesian model based MAC Identification from multiple nodes in network. Using such system we can provide lightweight burden to nodes hence improving energy efficiency. Simulated results shows improvement in estimated delay and average bits transfer parameter

    Intrusion Detection in Mobile Adhoc Network with Bayesian model based MAC Identification

    Get PDF
    Mobile Ad-hoc Networks (MANETs) are a collection of heterogeneous, infrastructure less, self-organizing and battery powered mobile nodes with different resources availability and computational capabilities. The dynamic and distributed nature of MANETs makes them suitable for deployment in extreme and volatile environmental conditions. They have found applications in diverse domains such as military operations, environmental monitoring, rescue operations etc. Each node in a MANET is equipped with a wireless transmitter and receiver, which enables it to communicate with other nodes within its wireless transmission range. However, due to limited wireless communication range and node mobility, nodes in MANET must cooperate with each other to provide networking services among themselves. Therefore, each node in a MANET acts both as a host and a router. Present Intrusion Detection Systems (IDSs) for MANETs require continuous monitoring which leads to rapid depletion of a node?s battery life. To avoid this issue we propose a system to prevent intrusion in MANET using Bayesian model based MAC Identification from multiple nodes in network. Using such system we can provide lightweight burden to nodes hence improving energy efficiency

    Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    Get PDF
    Abstract—We propose to combine social trust derived from social networks with quality-of-service (QoS) trust derived from communication networks to obtain a composite trust metric as a basis for evaluating trust of mobile nodes in mobile ad hoc network (MANET) environments. We develop a novel modelbased approach to identify the best protocol setting under which trust bias is minimized, that is, the peer-to-peer subjective trust as a result of executing our distributed trust management protocol is close to ground truth status over a wide range of operational and environment conditions with high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust bias minimization. I

    PERFORMANCE STATUTE PLAN-BASED INTRUSION DETECTION FOR SECURITY CRITICAL REMEDIAL CYBER PHYSICAL SYSTEMS

    Get PDF
    Since the cyber physical systems are rising quickly, network security could be a severe problem that could be considered. Many Invasion recognition systems exist presently utilizes several methods of invasion recognition. Medical cyber physical systems have grown to be recognized nowadays and each advanced healthcare hospital utilize help of medical cyber physical systems to simplify complex tasks. Scalping systems evaluate status within the patient by way of physical sensors and apply equivalent reaction by way of actuators. We introduce one methodology meant for invasion recognition is recommended which utilize behavioural rule specs-basis Invasion recognition which utilize behavioural rules intended for defining normal behavioural patterns for almost any medical device. This course of action has in addition been proven to show greater true positives meant for a smaller false negative in addition to false positive rate which later enables you to definitely recognize harder furthermore to invisible attackers
    corecore