77,215 research outputs found
Log-based Anomaly Detection of CPS Using a Statistical Method
Detecting anomalies of a cyber physical system (CPS), which is a complex
system consisting of both physical and software parts, is important because a
CPS often operates autonomously in an unpredictable environment. However,
because of the ever-changing nature and lack of a precise model for a CPS,
detecting anomalies is still a challenging task. To address this problem, we
propose applying an outlier detection method to a CPS log. By using a log
obtained from an actual aquarium management system, we evaluated the
effectiveness of our proposed method by analyzing outliers that it detected. By
investigating the outliers with the developer of the system, we confirmed that
some outliers indicate actual faults in the system. For example, our method
detected failures of mutual exclusion in the control system that were unknown
to the developer. Our method also detected transient losses of functionalities
and unexpected reboots. On the other hand, our method did not detect anomalies
that were too many and similar. In addition, our method reported rare but
unproblematic concurrent combinations of operations as anomalies. Thus, our
approach is effective at finding anomalies, but there is still room for
improvement
Fast, Robust, and Versatile Event Detection through HMM Belief State Gradient Measures
Event detection is a critical feature in data-driven systems as it assists
with the identification of nominal and anomalous behavior. Event detection is
increasingly relevant in robotics as robots operate with greater autonomy in
increasingly unstructured environments. In this work, we present an accurate,
robust, fast, and versatile measure for skill and anomaly identification. A
theoretical proof establishes the link between the derivative of the
log-likelihood of the HMM filtered belief state and the latest emission
probabilities. The key insight is the inverse relationship in which gradient
analysis is used for skill and anomaly identification. Our measure showed
better performance across all metrics than related state-of-the art works. The
result is broadly applicable to domains that use HMMs for event detection.Comment: 8 pages, 7 figures, double col, ieee conference forma
Anomaly Detection in Log Data using Graph Databases and Machine Learning to Defend Advanced Persistent Threats
Advanced Persistent Threats (APTs) are a main impendence in cyber security of
computer networks. In 2015, a successful breach remains undetected 146 days on
average, reported by [Fi16].With our work we demonstrate a feasible and fast
way to analyse real world log data to detect breaches or breach attempts. By
adapting well-known kill chain mechanisms and a combine of a time series
database and an abstracted graph approach, it is possible to create flexible
attack profiles. Using this approach, it can be demonstrated that the graph
analysis successfully detects simulated attacks by analysing the log data of a
simulated computer network. Considering another source for log data, the
framework is capable to deliver sufficient performance for analysing real-world
data in short time. By using the computing power of the graph database it is
possible to identify the attacker and furthermore it is feasible to detect
other affected system components. We believe to significantly reduce the
detection time of breaches with this approach and react fast to new attack
vectors.Comment: Lecture Notes in Informatics (LNI), Gesellschaft f\"ur Informatik,
Bonn 2017 237
- …
