50,240 research outputs found

    Autonomic computing architecture for SCADA cyber security

    Get PDF
    Cognitive computing relates to intelligent computing platforms that are based on the disciplines of artificial intelligence, machine learning, and other innovative technologies. These technologies can be used to design systems that mimic the human brain to learn about their environment and can autonomously predict an impending anomalous situation. IBM first used the term ‘Autonomic Computing’ in 2001 to combat the looming complexity crisis (Ganek and Corbi, 2003). The concept has been inspired by the human biological autonomic system. An autonomic system is self-healing, self-regulating, self-optimising and self-protecting (Ganek and Corbi, 2003). Therefore, the system should be able to protect itself against both malicious attacks and unintended mistakes by the operator

    Autonomic computing meets SCADA security

    Get PDF
    © 2017 IEEE. National assets such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks are critical infrastructures. The cyber threats to these infrastructures have increasingly become more sophisticated, extensive and numerous. Cyber security conventional measures have proved useful in the past but increasing sophistication of attacks dictates the need for newer measures. The autonomic computing paradigm mimics the autonomic nervous system and is promising to meet the latest challenges in the cyber threat landscape. This paper provides a brief review of autonomic computing applications for SCADA systems and proposes architecture for cyber security

    Autoencoder based anomaly detection for SCADA networks

    Get PDF
    Supervisory control and data acquisition (SCADA) systems are industrial control systems that are used to monitor critical infrastructures such as airports, transport, health, and public services of national importance. These are cyber physical systems, which are increasingly integrated with networks and internet of things devices. However, this results in a larger attack surface for cyber threats, making it important to identify and thwart cyber-attacks by detecting anomalous network traffic patterns. Compared to other techniques, as well as detecting known attack patterns, machine learning can also detect new and evolving threats. Autoencoders are a type of neural network that generates a compressed representation of its input data and through reconstruction loss of inputs can help identify anomalous data. This paper proposes the use of autoencoders for unsupervised anomaly-based intrusion detection using an appropriate differentiating threshold from the loss distribution and demonstrate improvements in results compared to other techniques for SCADA gas pipeline dataset

    Analysis and testing of aeroelastic model stability augmentation systems

    Get PDF
    Testing and evaluation of a stability augmentation system for aircraft flight control were performed. The flutter suppression system and synthesis conducted on a scale model of a supersonic wing for a transport aircraft are discussed. Mechanization and testing of the leading and trailing edge surface actuation systems are described. The ride control system analyses for a 375,000 pound gross weight B-52E aircraft are presented. Analyses of the B-52E aircraft maneuver load control system are included

    Charged analogue of Finch-Skea stars

    Get PDF
    We present solutions to the Einstein-Maxwell system of equations in spherically symmetric gravitational fields for static interior spacetimes with a specified form of the electric field intensity. The condition of pressure isotropy yields three category of solutions. The first category is expressible in terms of elementary functions and does not have an uncharged limit. The second category is given in terms of Bessel functions of half-integer order. These charged solutions satisfy a barotropic equation of state and contain Finch-Skea uncharged stars. The third category is obtained in terms of modified Bessel functions of half-integer order and does not have an uncharged limit. The physical features of the charged analogue of the Finch-Skea stars are studied in detail. In particular the condition of causality is satisfied and the speed of sound does not exceed the speed of light. The physical analysis indicates that this analogue is a realistic model for static charged relativistic perfect fluid spheres.Comment: 17 pages, To appear in Int. J. Mod. Phys.

    Analysis and testing of stability augmentation systems

    Get PDF
    Testing and evaluation of stability augmentation systems for aircraft flight control were conducted. The flutter suppression system analysis of a scale supersonic transport wing model is described. Mechanization of the flutter suppression system is reported. The ride control synthesis for the B-52 aeroelastic model is discussed. Model analyses were conducted using equations of motion generated from generalized mass and stiffness data
    • …
    corecore