130,448 research outputs found
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
With the explosive development of the critical services network systems and Internet, the need for networks security systems have become even critical with the enlargement of information technology in everyday life. Intrusion Prevention System (IPS) provides an in-line mechanism focus on identifying and blocking malicious network activity in real time. This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. Firstly, the current intrusions preventions systems, biological innate and adaptive immune systems, autonomic computing and self-healing mechanisms are studied and analyzed. The importance of intrusion prevention system recommends that artificial immune systems (AIS) should incorporate abstraction models from innate, adaptive immune system, pattern recognition, machine learning and self-healing mechanisms to present autonomous IPS system with fast and high accurate detection and prevention performance and survivability for critical services network system. Secondly, specification language, system design, mathematical and computational models for IPS and SH system are established, which are based upon nonlinear classification, prevention predictability trust, analysis, self-adaptation and self-healing algorithms. Finally, the validation of the system carried out by simulation tests, measuring, benchmarking and comparative studies. New benchmarking metrics for detection capabilities, prevention predictability trust and self-healing reliability are introduced as contributions for the IPS and SH system measuring and validation.
Using the software system, design theories, AIS features, new nonlinear classification algorithm, and self-healing system show how the use of presented systems can ensure safety for critical services networks and heal the damage caused by intrusion. This autonomous system improves the performance of the current intrusion prevention system and carries on system continuity by using self-healing mechanism
Uncovering Vulnerable Industrial Control Systems from the Internet Core
Industrial control systems (ICS) are managed remotely with the help of
dedicated protocols that were originally designed to work in walled gardens.
Many of these protocols have been adapted to Internet transport and support
wide-area communication. ICS now exchange insecure traffic on an inter-domain
level, putting at risk not only common critical infrastructure but also the
Internet ecosystem (e.g., DRDoS~attacks).
In this paper, we uncover unprotected inter-domain ICS traffic at two central
Internet vantage points, an IXP and an ISP. This traffic analysis is correlated
with data from honeypots and Internet-wide scans to separate industrial from
non-industrial ICS traffic. We provide an in-depth view on Internet-wide ICS
communication. Our results can be used i) to create precise filters for
potentially harmful non-industrial ICS traffic, and ii) to detect ICS sending
unprotected inter-domain ICS traffic, being vulnerable to eavesdropping and
traffic manipulation attacks
Identifying attack surfaces in the evolving space industry using reference architectures
The space environment is currently undergoing a substantial change and many new entrants to the market are deploying devices, satellites and systems in space; this evolution has been termed as NewSpace. The change is complicated by technological developments such as deploying machine learning based autonomous space systems and the Internet of Space Things (IoST). In the IoST, space systems will rely on satellite-to-x communication and interactions with wider aspects of the ground segment to a greater degree than existing systems. Such developments will inevitably lead to a change in the cyber security threat landscape of space systems. Inevitably, there will be a greater number of attack vectors for adversaries to exploit, and previously infeasible threats can be realised, and thus require mitigation. In this paper, we present a reference architecture (RA) that can be used to abstractly model in situ applications of this new space landscape. The RA specifies high-level system components and their interactions. By instantiating the RA for two scenarios we demonstrate how to analyse the attack surface using attack trees
Infrastructure coverage of the ural federal district regions: assessment metodology and diagnostic results
The article examines the infrastructure as one of the essential elements in the economic system. The authors consider the development stages of this concept in the scientific community and provide the opinions of a number of researchers as to the role and place of the infrastructure in the economic system. The article provides a brief genesis of approaches to describing the infrastructure and conferring its functions on individual branches. The authors emphasize the higher importance of infrastructure coverage with the economy transition to machine production. Two key methodological approaches are identified to describe the substance and content of the infrastructure: industrial and functional. The authors offer their methodology of assessing the infrastructure coverage of regional-level territories. The methodology is based on identifying a combination of specific indicators the values of which can be used to evaluate the development level of individual infrastructure elements. The indicative analysis being the basis of the methodological apparatus helps make a judgment of any phenomenon by comparing the current observed values with the previously adopted threshold levels. Such comparison makes it possible to classify the observations by the «norm—pre-crisis—crisis» scale. An essential advantage of this method is the possibility of standardizing the indicators, or, in other words, bringing them to one comparable conditional value. Thus, you can get estimates for individual blocks of indicators and a complex assessment for the whole set in general. The authors have identified four main infrastructure elements: transport, communications, public utility services and healthcare. The methodology includes 21 indicators all together. The test estimates based on the authors’ methodology revealed the defects in the development of the Ural regions` infrastructure. The article provides a brief analysis of the obtained data with identifying individual indicators and areas.The research has been supported by the Russian Science Foundation (Project № 14-18-00574)
Interoperable Systems: an introduction
This short chapter introduces interoperable systems and attempts to distinguish the principal
research strands in this area. It is not intended as a review. Significant review material is
integrated with each of the succeeding chapters. It is rather intended to whet the appetite for
what follows and to provide some initial conceptual orientation.
This book concerns the architecture, modelling and management of interoperable computing
systems. Our collective research agenda addresses all aspects of interoperable systems
development, including the business and industry requirements and environments for
distributed information services
Computational Contributions to the Automation of Agriculture
The purpose of this paper is to explore ways that computational advancements have enabled the complete automation of agriculture from start to finish. With a major need for agricultural advancements because of food and water shortages, some farmers have begun creating their own solutions to these problems. Primarily explored in this paper, however, are current research topics in the automation of agriculture. Digital agriculture is surveyed, focusing on ways that data collection can be beneficial. Additionally, self-driving technology is explored with emphasis on farming applications. Machine vision technology is also detailed, with specific application to weed management and harvesting of crops. Finally, the effects of automating agriculture are briefly considered, including labor, the environment, and direct effects on farmers
Investigating Robustness in Cyber-Physical Systems: Specification-Centric Analysis in the face of System Deviations
The adoption of cyber-physical systems (CPS) is on the rise in complex
physical environments, encompassing domains such as autonomous vehicles, the
Internet of Things (IoT), and smart cities. A critical attribute of CPS is
robustness, denoting its capacity to operate safely despite potential
disruptions and uncertainties in the operating environment. This paper proposes
a novel specification-based robustness, which characterizes the effectiveness
of a controller in meeting a specified system requirement, articulated through
Signal Temporal Logic (STL) while accounting for possible deviations in the
system. This paper also proposes the robustness falsification problem based on
the definition, which involves identifying minor deviations capable of
violating the specified requirement. We present an innovative two-layer
simulation-based analysis framework designed to identify subtle robustness
violations. To assess our methodology, we devise a series of benchmark problems
wherein system parameters can be adjusted to emulate various forms of
uncertainties and disturbances. Initial evaluations indicate that our
falsification approach proficiently identifies robustness violations, providing
valuable insights for comparing robustness between conventional and
reinforcement learning (RL)-based controllersComment: 12 page
Emergent behaviors in the Internet of things: The ultimate ultra-large-scale system
To reach its potential, the Internet of Things (IoT) must break down the silos that limit applications' interoperability and hinder their manageability. Doing so leads to the building of ultra-large-scale systems (ULSS) in several areas, including autonomous vehicles, smart cities, and smart grids. The scope of ULSS is both large and complex. Thus, the authors propose Hierarchical Emergent Behaviors (HEB), a paradigm that builds on the concepts of emergent behavior and hierarchical organization. Rather than explicitly programming all possible decisions in the vast space of ULSS scenarios, HEB relies on the emergent behaviors induced by local rules at each level of the hierarchy. The authors discuss the modifications to classical IoT architectures required by HEB, as well as the new challenges. They also illustrate the HEB concepts in reference to autonomous vehicles. This use case paves the way to the discussion of new lines of research.Damian Roca work was supported by a Doctoral Scholarship provided by Fundación La Caixa. This work has been supported by the Spanish Government (Severo Ochoa
grants SEV2015-0493) and by the Spanish Ministry of Science and Innovation (contracts TIN2015-65316-P).Peer ReviewedPostprint (author's final draft
- …