Skip to main content
Top
Published in: Wireless Personal Communications 2/2022

04-07-2021

A Novel Decentralized Analytical Methodology for Cyber Physical Networks Attack Detection

Authors: Abdulrahman Saad Alqahtani, Khaled Ali Abuhasel, Mohammed Alquraish

Published in: Wireless Personal Communications | Issue 2/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In many functional implementations of considerable engineering significance, cyber physical solutions have recently been developed where protection and privacy are essential. This led to the recent increase in interest in the development of advanced and emerging technology for anomaly and intrusion detection. The paper suggests a new frame for the distributed blind intrusion detection by modelling sensor measurements as the graph signal and using the statistical features of the graph signal for the detection of intrusion. The graphic similarity matrices is generated using the measured data of the sensors as well as the proximity of the sensors to completely take account of the underlying network structure. The scope of the collected data is modelled on the random field Gaussian Markov and the required precision matrix can be determined by adjusting to a graph called Laplacian matrix. For research statistics, the suggested technique for intrusion detection is based on the modified Bayesian probability ratio test and the closed-form expressions are derived. In the end, the time analysis of the actions of the network is calculated by computing the Bhattacharyya distance at consecutive times among the measurement distributions. Experiments are carried out, evaluated and equate the efficiency of the proposed system to the modern method. The findings indicate a detection value better than that offered by other existing systems via the proposed intrusion detection frame.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Polycarpou, & Eliades, M. M. (2010). A fault diagnosis and security framework for water systems. IEEE Transactions on Control Systems Technology, 18(6), 1254–1265.CrossRef Polycarpou, & Eliades, M. M. (2010). A fault diagnosis and security framework for water systems. IEEE Transactions on Control Systems Technology, 18(6), 1254–1265.CrossRef
2.
go back to reference Egilmez, E. Pavez, & A. Ortega (2016). Graph learning with Laplacian constraints: modeling attractive Gaussian Markov random fields,” in Proc. 50th Asilomar Conference on Signals, Systems and Computers, pp. 1470–1474. Egilmez, E. Pavez, & A. Ortega (2016). Graph learning with Laplacian constraints: modeling attractive Gaussian Markov random fields,” in Proc. 50th Asilomar Conference on Signals, Systems and Computers, pp. 1470–1474.
3.
go back to reference Tabuada, F. P., & Diggavi, S. (2014). Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Transactions on Automatic Control, 59(6), 1454–1467.MathSciNetCrossRefMATH Tabuada, F. P., & Diggavi, S. (2014). Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Transactions on Automatic Control, 59(6), 1454–1467.MathSciNetCrossRefMATH
4.
go back to reference Tong, K. L., & Thomas, R. J. (2015). Subspace methods for data attack on state estimation: A data driven approach. IEEE Transactions on Signal Processing, 63(5), 1102–1114.MathSciNetCrossRefMATH Tong, K. L., & Thomas, R. J. (2015). Subspace methods for data attack on state estimation: A data driven approach. IEEE Transactions on Signal Processing, 63(5), 1102–1114.MathSciNetCrossRefMATH
5.
go back to reference Kailath, T. (1967). The divergence and Bhattacharyya distance measures in signal selection. IEEE Transactions on Communication Technology, 15(1), 52–60.CrossRef Kailath, T. (1967). The divergence and Bhattacharyya distance measures in signal selection. IEEE Transactions on Communication Technology, 15(1), 52–60.CrossRef
6.
go back to reference Mohammadi, & Plataniotis, K. N. (2016). Improper complex-valued Bhattacharyya distance. IEEE Transactions on Neural Networks and Learning Systems, 27(5), 1049–1064.MathSciNetCrossRef Mohammadi, & Plataniotis, K. N. (2016). Improper complex-valued Bhattacharyya distance. IEEE Transactions on Neural Networks and Learning Systems, 27(5), 1049–1064.MathSciNetCrossRef
7.
go back to reference Mo, & Sinopoli, B. (2015). Secure estimation in the presence of integrity attacks. IEEE Transactions on Signal Processing, 60(4), 1145–1151.MathSciNetMATH Mo, & Sinopoli, B. (2015). Secure estimation in the presence of integrity attacks. IEEE Transactions on Signal Processing, 60(4), 1145–1151.MathSciNetMATH
8.
go back to reference Sadreazami, A. Asif & A. Mohammadi (2017). Image stylization using iterative graph filtering, in Proc. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–4. Sadreazami, A. Asif & A. Mohammadi (2017). Image stylization using iterative graph filtering, in Proc. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1–4.
9.
go back to reference Sadreazami, A. Asif & A. Mohammadi (2017). A late adaptive graphbased edge-aware filtering with iterative weight updating process. in Proc. IEEE Mid-West Symposium on Circuits and Systems (MWSCAS). Sadreazami, A. Asif & A. Mohammadi (2017). A late adaptive graphbased edge-aware filtering with iterative weight updating process. in Proc. IEEE Mid-West Symposium on Circuits and Systems (MWSCAS).
10.
go back to reference Vempaty, A., Ozdemir, O., Agrawal, K., Chen, H., & Varshney, P. K. (2013). Localization in wireless sensor networks: Byzantines and mitigation techniques. IEEE Transactions on Signal Processing., 61(6), 1495–1508.MathSciNetCrossRefMATH Vempaty, A., Ozdemir, O., Agrawal, K., Chen, H., & Varshney, P. K. (2013). Localization in wireless sensor networks: Byzantines and mitigation techniques. IEEE Transactions on Signal Processing., 61(6), 1495–1508.MathSciNetCrossRefMATH
11.
go back to reference Zhang, J., Blum, R. S., Lu, X., & Conus, D. (2015). Asymptotically optimum distributed estimation in the presence of attacks. IEEE Transactions on Signal Processing, 63(5), 1086–1101.MathSciNetCrossRefMATH Zhang, J., Blum, R. S., Lu, X., & Conus, D. (2015). Asymptotically optimum distributed estimation in the presence of attacks. IEEE Transactions on Signal Processing, 63(5), 1086–1101.MathSciNetCrossRefMATH
12.
go back to reference Lee, W. & D Xiang, D. (2001). Information-theoretic measures for anomaly detection, in Proc. IEEE Symposium on Security and Privacy. Lee, W. & D Xiang, D. (2001). Information-theoretic measures for anomaly detection, in Proc. IEEE Symposium on Security and Privacy.
Metadata
Title
A Novel Decentralized Analytical Methodology for Cyber Physical Networks Attack Detection
Authors
Abdulrahman Saad Alqahtani
Khaled Ali Abuhasel
Mohammed Alquraish
Publication date
04-07-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2022
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08716-5

Other articles of this Issue 2/2022

Wireless Personal Communications 2/2022 Go to the issue