Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2020

01.12.2020

Identification of Anomalies in the Operation of Telecommunication Devices Based on Local Signal Spectra

verfasst von: M. E. Sukhoparov, V. V. Semenov, K. I. Salakhutdinova, I. S. Lebedev

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2020

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract—

Telecommunication devices are becoming one of the critical elements of industrial systems. They are an attractive target for potential attackers. A method for identification of anomalies based on local signal spectra and using neural networks for evaluation is considered. An experiment is performed on the basis of statistical data on the loading of a computing device.
Literatur
1.
Zurück zum Zitat Vasiliev, Y.S., Zegzhda, P.D., and Kuvshinov, V.I., Modern problems of cybersecurity, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2014, vol. 17, no. 3, pp. 210–214. Vasiliev, Y.S., Zegzhda, P.D., and Kuvshinov, V.I., Modern problems of cybersecurity, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2014, vol. 17, no. 3, pp. 210–214.
2.
Zurück zum Zitat Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., and Suprun, A.F., The problem of innovative development of information security systems in the transport sector, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1105–1110.CrossRef Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., and Suprun, A.F., The problem of innovative development of information security systems in the transport sector, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1105–1110.CrossRef
3.
Zurück zum Zitat Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems, ICPS 2018, 2018, pp. 830–834. Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems, ICPS 2018, 2018, pp. 830–834.
4.
Zurück zum Zitat Zegzhda, D.P., Poltavtseva, M.A., and Lavrova, D.S., Systematization and security assessment of cyber-physical systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 835–843.CrossRef Zegzhda, D.P., Poltavtseva, M.A., and Lavrova, D.S., Systematization and security assessment of cyber-physical systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 835–843.CrossRef
7.
Zurück zum Zitat Platonov, V.V. and Semenov, P.O., Using data-mining methods to detect network attacks, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 766–769.CrossRef Platonov, V.V. and Semenov, P.O., Using data-mining methods to detect network attacks, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 766–769.CrossRef
8.
Zurück zum Zitat Zegzhda, D.P. and Kalinin, M.O., Security assurance for the attribute-based access control systems, International Conference on Enterprise Information Systems and Web Technologies 2008, EISWT 2008, pp. 147–154. Zegzhda, D.P. and Kalinin, M.O., Security assurance for the attribute-based access control systems, International Conference on Enterprise Information Systems and Web Technologies 2008, EISWT 2008, pp. 147–154.
10.
Zurück zum Zitat Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976.CrossRef Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976.CrossRef
13.
Zurück zum Zitat Yeung, D.Y. and Ding, Y., Host-based intrusion detection using dynamic and static behavioral models, Pattern Recognit., 2003, vol. 36, no. 1, pp. 229–243.CrossRef Yeung, D.Y. and Ding, Y., Host-based intrusion detection using dynamic and static behavioral models, Pattern Recognit., 2003, vol. 36, no. 1, pp. 229–243.CrossRef
14.
Zurück zum Zitat Yuan, K., Ling, Q., and Yin, W., On the convergence of decentralized gradient descent, SIAM J. Optim., 2016, vol. 26, no. 3, pp. 1835–1854.MathSciNetCrossRef Yuan, K., Ling, Q., and Yin, W., On the convergence of decentralized gradient descent, SIAM J. Optim., 2016, vol. 26, no. 3, pp. 1835–1854.MathSciNetCrossRef
15.
Zurück zum Zitat Slay, J. and Miller, M., Lessons learned from the Maroochy water breach, in Critical Infrastructure Protection, Springer, 2007, pp. 73–82. Slay, J. and Miller, M., Lessons learned from the Maroochy water breach, in Critical Infrastructure Protection, Springer, 2007, pp. 73–82.
16.
Zurück zum Zitat Zegzhda, D.P., Kalinin, M.O., and Levykin, M.V., Actual vulnerabilities of industrial automation protocols of an open platform communications series, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 972–979.CrossRef Zegzhda, D.P., Kalinin, M.O., and Levykin, M.V., Actual vulnerabilities of industrial automation protocols of an open platform communications series, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 972–979.CrossRef
17.
Zurück zum Zitat Gao, D., Reiter, M.K., and Song, D., Beyond output voting: Detecting compromised replicas using hmm-based behavioral distance, IEEE Trans. Dependable Secure Comput., 2009, vol. 6, no. 2, pp. 96–110.CrossRef Gao, D., Reiter, M.K., and Song, D., Beyond output voting: Detecting compromised replicas using hmm-based behavioral distance, IEEE Trans. Dependable Secure Comput., 2009, vol. 6, no. 2, pp. 96–110.CrossRef
18.
Zurück zum Zitat Igure, V.M., Laughter, S.A., and Williams, R.D., Security issues in SCADA networks, Comput. Secur., 2006, vol. 25, no. 7, pp. 498–506.CrossRef Igure, V.M., Laughter, S.A., and Williams, R.D., Security issues in SCADA networks, Comput. Secur., 2006, vol. 25, no. 7, pp. 498–506.CrossRef
20.
Zurück zum Zitat Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of Internet backbone traffic for detecting denial of service attacks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 936–944.CrossRef Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of Internet backbone traffic for detecting denial of service attacks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 936–944.CrossRef
21.
Zurück zum Zitat Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912–917.CrossRef Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912–917.CrossRef
23.
Zurück zum Zitat Zegzhda, P.D., Zegzhda, D.P., Kalinin, M.O., and Konoplev, A.S., Security modeling of grid systems using petri nets, Lect. Notes Comput. Sci., 2012, vol. 7531, pp. 299–308.CrossRef Zegzhda, P.D., Zegzhda, D.P., Kalinin, M.O., and Konoplev, A.S., Security modeling of grid systems using petri nets, Lect. Notes Comput. Sci., 2012, vol. 7531, pp. 299–308.CrossRef
24.
Zurück zum Zitat Kalinin, M., Demidov, R., and Zegzhda, P., Hybrid neural network model for protection of dynamic cyber infrastructure, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 4, pp. 375–382. Kalinin, M., Demidov, R., and Zegzhda, P., Hybrid neural network model for protection of dynamic cyber infrastructure, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 4, pp. 375–382.
25.
Zurück zum Zitat Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976.CrossRef Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976.CrossRef
26.
Zurück zum Zitat Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 977–983.CrossRef Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 977–983.CrossRef
28.
Zurück zum Zitat Malyshev, E.V., Moskvin, D.A., and Zegzhda, D.P., Application of an artificial neural network for detection of attacks in vanets, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 889–894.CrossRef Malyshev, E.V., Moskvin, D.A., and Zegzhda, D.P., Application of an artificial neural network for detection of attacks in vanets, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 889–894.CrossRef
31.
Zurück zum Zitat Gers, F.A., Schmidhuber, J., and Cummins, F., Learning to forget: Continual prediction with LSTM, Neural Comput., 2000, vol. 12, no. 10, pp. 2451–2471.CrossRef Gers, F.A., Schmidhuber, J., and Cummins, F., Learning to forget: Continual prediction with LSTM, Neural Comput., 2000, vol. 12, no. 10, pp. 2451–2471.CrossRef
32.
Zurück zum Zitat Ho, T.K., Random decision forests in document analysis and recognition, 3rd International Conference on Document Analysis and Recognition, 1995, vol. 1, pp. 278–282. Ho, T.K., Random decision forests in document analysis and recognition, 3rd International Conference on Document Analysis and Recognition, 1995, vol. 1, pp. 278–282.
33.
35.
Zurück zum Zitat Semenov, V.V., Application of an autonomous object behavior model to classify the cybersecurity state, Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2009, pp. 104–112. Semenov, V.V., Application of an autonomous object behavior model to classify the cybersecurity state, Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2009, pp. 104–112.
36.
Zurück zum Zitat Bendat, J.S. and Piersol, A.G., Engineering Applications of Correlation and Spectral Analysis, Wiley, 1980.MATH Bendat, J.S. and Piersol, A.G., Engineering Applications of Correlation and Spectral Analysis, Wiley, 1980.MATH
Metadaten
Titel
Identification of Anomalies in the Operation of Telecommunication Devices Based on Local Signal Spectra
verfasst von
M. E. Sukhoparov
V. V. Semenov
K. I. Salakhutdinova
I. S. Lebedev
Publikationsdatum
01.12.2020
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2020
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411620080337

Weitere Artikel der Ausgabe 8/2020

Automatic Control and Computer Sciences 8/2020 Zur Ausgabe

Neuer Inhalt