19 research outputs found

    Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems

    Get PDF
    Nowadays, physical health of equipment controlled by Cyber-Physical Systems (CPS) is a significant concern. This paper reports a work, in which, a hardware is placed between Programmable Logic Controller (PLC) and the actuator as a solution. The proposed hardware operates in two conditions, i.e. passive and active. Operation of the proposed solution is based on the repetitive operational profile of the actuators. The normal operational profile of the actuator is fed to the protective hardware and is considered as the normal operating condition. In the normal operating condition, the middleware operates in its passive mode and simply monitors electronic signals passing between PLC and Actuator. In case of any malicious operation, the proposed hardware operates in its active mode and both slowly stops the actuator and sends an alert to SCADA server initiating execution of the actuator’s emergency profile. Thus, the proposed hardware gains control over the actuator and prevents any physical damage on the operating devices. Two sample experiments are reported in which, results of implementing the proposed solution are reported and assessed. Results show that once the PLC sends incorrect data to actuator, the proposed hardware detects it as an anomaly. Therefore, it does not allow the PLC to send incorrect and unauthorized data pattern to its actuator. Significance of the paper is in introducing a solution to prevent destruction of physical devices apart from source or purpose of the encountered anomaly and apart from CPS functionality or PLC model and operation

    Detection of repetitive and irregular hypercall attacks from guest virtual machines to Xen hypervisor

    Get PDF
    Virtualization is critical to the infrastructure of cloud computing environment and other online services. Hypercall interface is provided by hypervisor to offer privileged requests by the guest domains. Attackers may use this interface to send malicious hypercalls. In the reported work, repetitive hypercall attacks and sending hypercalls within irregular sequences to Xen hypervisor were analyzed, and finally, an intrusion detection system (IDS) is proposed to detect these attacks. The proposed system is placed in the host domain (Dom0). Monitoring hypercalls traffic the system operates based on the identification of irregular behaviors in hypercalls sent from guest domains to hypervisor. Later on, the association rule algorithm is applied on the collected data within a fixed time window, and a set of thresholds for maximum number of all types of the hypercalls is extracted. The results from the implementation of the proposed system show 91% true positive rate

    A strategy for trust propagation along the more trusted paths

    Get PDF
    The main goal of social networks are sharing and exchanging information among users. With the rapid growth of social networks on the Web, the most of interactions are conducted among unknown individuals. On the other hand, with increasing the biased behaviors in online communities, ability to assess the level of trustworthiness of a person before interacting with him has an important influence on users' decisions. Trust inference is a method used for this purpose. This paper studies propagating trust values along trust relationships in order to estimate the reliability of an anonymous person from the point of view of the user who intends to trust him/her. It describes a new approach for predicting trust values in social networks. The proposed method selects the most reliable trust paths from a source node to a destination node. In order to select the optimal paths, a new relation for calculating trustable coefficient based on previous performance of users in the social network is proposed. In ciao dataset there is a column called helpfulness. Helpfulness values represent previous performance of users in the social network. Advantages of this algorithm is its simplicity in trust calculation, using a new entity in dataset and its improvement in accuracy. The results of the experiments on Ciao dataset indicate that accuracy of the proposed method in evaluating trust values is higher than well-known methods in this area including TidalTrust, MoleTrust methods

    Camera pose estimation in unknown environments using a sequence of wide-baseline monocular images

    Get PDF
    In this paper, a feature-based technique for the camera pose estimation in a sequence of wide-baseline images has been proposed. Camera pose estimation is an important issue in many computer vision and robotics applications, such as, augmented reality and visual SLAM. The proposed method can track captured images taken by hand-held camera in room-sized workspaces with maximum scene depth of 3-4 meters. The system can be used in unknown environments with no additional information available from the outside world except in the first two images that are used for initialization. Pose estimation is performed using only natural feature points extracted and matched in successive images. In wide-baseline images unlike consecutive frames of a video stream, displacement of the feature points in consecutive images is notable and hence cannot be traced easily using patch-based methods. To handle this problem, a hybrid strategy is employed to obtain accurate feature correspondences. In this strategy, first initial feature correspondences are found using similarity of their descriptors and then outlier matchings are removed by applying RANSAC algorithm. Further, to provide a set of required feature matchings a mechanism based on sidelong result of robust estimator was employed. The proposed method is applied on indoor real data with images in VGA quality (640×480 pixels) and on average the translation error of camera pose is less than 2 cm which indicates the effectiveness and accuracy of the proposed approach

    A Novel Non-Negative Matrix Factorization Method for Recommender Systems

    Get PDF
    Recommender systems collect various kinds of data to create their recommendations. Collaborative filtering is a common technique in this area. This technique gathers and analyzes information on users preferences, and then estimates what users will like based on their similarity to other users. However, most of current collaborative filtering approaches have faced two problems: sparsity and scalability. This paper proposes a novel method by applying non-negative matrix factorization, which alleviates these problems via matrix factorization and similarity. Non-negative matrix factorization attempts to find two non-negative matrices whose product can well approximate the original matrix. It also imposes non-negative constraints on the latent factors. The proposed method presents novel update rules to learn the latent factors for predicting unknown rating. Unlike most of collaborative filtering methods, the proposed method can predict all the unknown ratings. It is easily implemented and its computational complexity is very low. Empirical studies on MovieLens and Book-Crossing datasets display that the proposed method is more tolerant against the problems of sparsity and scalability, and obtains good results

    A Seven-Valued Full Adder/Subtractor Architecture

    No full text
    Current generation of computers is based on binary logic. There are two types or operations executed in this generation i.e., mathematical and logical operations. Logical instructions use binary logic operations while the mathematical operations yet again use the mathematical operations based on binary logic. This article introduces a new idea based on Multi-Valued Logic (MVL) to build a full adder. Here mathematical and logical operations are considered separately. The reported work only considers mathematical operation and more specifically the full adder. The proposed full-adder circuit is based on Operational Amplifier (Op-Amp) and uses MVL with seven electrical levels for its design. This work is implemented in voltage mode and it is a step towards a new generation of computers. Schematic, layout, design and test results for the proposed full-adder are reported in the article

    A Novel Seven-valued Buffer

    No full text
    In many-valued logic, voltage regulation for individual logic levels plays an important role in building stacking capability for the circuitry. The main problem is the noise immunity and is shows itself in cascading a number of components such as full adders. Multi-Valued Buffer (MVB) represents a solution to improve noise immunity and to solve the cascading problem of multi-valued based circuits e.g. seven level full adder. The proposed MVB is designed in voltage mode. This buffer is expandable and it is capable of being implemented using more levels with the same approach

    A Novel Non-Negative Matrix Factorization Method for Recommender Systems

    No full text
    Recommender systems collect various kinds of data to create their recommendations. Collaborative filtering is a common technique in this area. This technique gathers and analyzes information on users preferences, and then estimates what users will like based on their similarity to other users. However, most of current collaborative filtering approaches have faced two problems: sparsity and scalability. This paper proposes a novel method by applying non-negative matrix factorization, which alleviates these problems via matrix factorization and similarity. Non-negative matrix factorization attempts to find two non-negative matrices whose product can well approximate the original matrix. It also imposes non-negative constraints on the latent factors. The proposed method presents novel update rules to learn the latent factors for predicting unknown rating. Unlike most of collaborative filtering methods, the proposed method can predict all the unknown ratings. It is easily implemented and its computational complexity is very low. Empirical studies on MovieLens and Book-Crossing datasets display that the proposed method is more tolerant against the problems of sparsity and scalability, and obtains good results
    corecore