Skip to main content
Erschienen in: Wireless Personal Communications 2/2022

04.07.2021

A Novel Decentralized Analytical Methodology for Cyber Physical Networks Attack Detection

verfasst von: Abdulrahman Saad Alqahtani, Khaled Ali Abuhasel, Mohammed Alquraish

Erschienen in: Wireless Personal Communications | Ausgabe 2/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In many functional implementations of considerable engineering significance, cyber physical solutions have recently been developed where protection and privacy are essential. This led to the recent increase in interest in the development of advanced and emerging technology for anomaly and intrusion detection. The paper suggests a new frame for the distributed blind intrusion detection by modelling sensor measurements as the graph signal and using the statistical features of the graph signal for the detection of intrusion. The graphic similarity matrices is generated using the measured data of the sensors as well as the proximity of the sensors to completely take account of the underlying network structure. The scope of the collected data is modelled on the random field Gaussian Markov and the required precision matrix can be determined by adjusting to a graph called Laplacian matrix. For research statistics, the suggested technique for intrusion detection is based on the modified Bayesian probability ratio test and the closed-form expressions are derived. In the end, the time analysis of the actions of the network is calculated by computing the Bhattacharyya distance at consecutive times among the measurement distributions. Experiments are carried out, evaluated and equate the efficiency of the proposed system to the modern method. The findings indicate a detection value better than that offered by other existing systems via the proposed intrusion detection frame.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Polycarpou, & Eliades, M. M. (2010). A fault diagnosis and security framework for water systems. IEEE Transactions on Control Systems Technology, 18(6), 1254–1265.CrossRef Polycarpou, & Eliades, M. M. (2010). A fault diagnosis and security framework for water systems. IEEE Transactions on Control Systems Technology, 18(6), 1254–1265.CrossRef
2.
Zurück zum Zitat Egilmez, E. Pavez, & A. Ortega (2016). Graph learning with Laplacian constraints: modeling attractive Gaussian Markov random fields,” in Proc. 50th Asilomar Conference on Signals, Systems and Computers, pp. 1470–1474. Egilmez, E. Pavez, & A. Ortega (2016). Graph learning with Laplacian constraints: modeling attractive Gaussian Markov random fields,” in Proc. 50th Asilomar Conference on Signals, Systems and Computers, pp. 1470–1474.
3.
Zurück zum Zitat Tabuada, F. P., & Diggavi, S. (2014). Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Transactions on Automatic Control, 59(6), 1454–1467.MathSciNetCrossRefMATH Tabuada, F. P., & Diggavi, S. (2014). Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Transactions on Automatic Control, 59(6), 1454–1467.MathSciNetCrossRefMATH
4.
Zurück zum Zitat Tong, K. L., & Thomas, R. J. (2015). Subspace methods for data attack on state estimation: A data driven approach. IEEE Transactions on Signal Processing, 63(5), 1102–1114.MathSciNetCrossRefMATH Tong, K. L., & Thomas, R. J. (2015). Subspace methods for data attack on state estimation: A data driven approach. IEEE Transactions on Signal Processing, 63(5), 1102–1114.MathSciNetCrossRefMATH
5.
Zurück zum Zitat Kailath, T. (1967). The divergence and Bhattacharyya distance measures in signal selection. IEEE Transactions on Communication Technology, 15(1), 52–60.CrossRef Kailath, T. (1967). The divergence and Bhattacharyya distance measures in signal selection. IEEE Transactions on Communication Technology, 15(1), 52–60.CrossRef
6.
Zurück zum Zitat Mohammadi, & Plataniotis, K. N. (2016). Improper complex-valued Bhattacharyya distance. IEEE Transactions on Neural Networks and Learning Systems, 27(5), 1049–1064.MathSciNetCrossRef Mohammadi, & Plataniotis, K. N. (2016). Improper complex-valued Bhattacharyya distance. IEEE Transactions on Neural Networks and Learning Systems, 27(5), 1049–1064.MathSciNetCrossRef
7.
Zurück zum Zitat Mo, & Sinopoli, B. (2015). Secure estimation in the presence of integrity attacks. IEEE Transactions on Signal Processing, 60(4), 1145–1151.MathSciNetMATH Mo, & Sinopoli, B. (2015). Secure estimation in the presence of integrity attacks. IEEE Transactions on Signal Processing, 60(4), 1145–1151.MathSciNetMATH
8.
Zurück zum Zitat Sadreazami, A. Asif & A. Mohammadi (2017). Image stylization using iterative graph filtering, in Proc. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–4. Sadreazami, A. Asif & A. Mohammadi (2017). Image stylization using iterative graph filtering, in Proc. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–4.
9.
Zurück zum Zitat Sadreazami, A. Asif & A. Mohammadi (2017). A late adaptive graphbased edge-aware filtering with iterative weight updating process. in Proc. IEEE Mid-West Symposium on Circuits and Systems (MWSCAS). Sadreazami, A. Asif & A. Mohammadi (2017). A late adaptive graphbased edge-aware filtering with iterative weight updating process. in Proc. IEEE Mid-West Symposium on Circuits and Systems (MWSCAS).
10.
Zurück zum Zitat Vempaty, A., Ozdemir, O., Agrawal, K., Chen, H., & Varshney, P. K. (2013). Localization in wireless sensor networks: Byzantines and mitigation techniques. IEEE Transactions on Signal Processing., 61(6), 1495–1508.MathSciNetCrossRefMATH Vempaty, A., Ozdemir, O., Agrawal, K., Chen, H., & Varshney, P. K. (2013). Localization in wireless sensor networks: Byzantines and mitigation techniques. IEEE Transactions on Signal Processing., 61(6), 1495–1508.MathSciNetCrossRefMATH
11.
Zurück zum Zitat Zhang, J., Blum, R. S., Lu, X., & Conus, D. (2015). Asymptotically optimum distributed estimation in the presence of attacks. IEEE Transactions on Signal Processing, 63(5), 1086–1101.MathSciNetCrossRefMATH Zhang, J., Blum, R. S., Lu, X., & Conus, D. (2015). Asymptotically optimum distributed estimation in the presence of attacks. IEEE Transactions on Signal Processing, 63(5), 1086–1101.MathSciNetCrossRefMATH
12.
Zurück zum Zitat Lee, W. & D Xiang, D. (2001). Information-theoretic measures for anomaly detection, in Proc. IEEE Symposium on Security and Privacy. Lee, W. & D Xiang, D. (2001). Information-theoretic measures for anomaly detection, in Proc. IEEE Symposium on Security and Privacy.
Metadaten
Titel
A Novel Decentralized Analytical Methodology for Cyber Physical Networks Attack Detection
verfasst von
Abdulrahman Saad Alqahtani
Khaled Ali Abuhasel
Mohammed Alquraish
Publikationsdatum
04.07.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2022
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08716-5

Weitere Artikel der Ausgabe 2/2022

Wireless Personal Communications 2/2022 Zur Ausgabe

Neuer Inhalt