Smart City Gnosys

Smart city article details

Title Learning Constraint-Based Model For Detecting Malicious Activities In Cyber Physical Systems
ID_Doc 34875
Authors Balogh A.; Mehta D.; Sobonski P.; Mady A.; Vuppala S.
Year 2019
Published Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019
DOI http://dx.doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00253
Abstract Advances in computing, communications, sensors, and cloud computing have resulted in the proliferation of Internet of Things (IoT) which forms a foundation for Cyber-Physical Systems (CPS). Cyber-physical attacks can cause tangible effects in the physical world. The attacker's goal is to disrupt the normal operations of the CPS for example: equipment overstress, safety limits violation, damage to the product quality, safety compliance violation etc. The continued rise of cyber-attacks together with the evolving skills of the attackers, and the inefficiency of the traditional security algorithms to defend against advanced and sophisticated attacks such as Distributed Denial of service (DDoS), slow DoS and zero-day, necessitate the development of novel defense and resilient detection techniques compared to traditional approaches like signature and behavior-based methods. To deal with this, we propose a novel approach for learning detection model that includes operational and network data to detect advanced attacks. More precisely, our approach is able to learn a relational network that connects events at different system layers so that attacks can be identified with higher confidence level. In this paper, we propose a decision model by learning a set of constraints/relations from the data that conjunctively defines the normal operation of a CPS. The solutions of the decision model characterize the normal states of a given CPS. The malicious operations are detected when one or more constraints fail for a given state of CPS. The results demonstrates the effectiveness of the approach. The main advantage of our approach is the interpretability of the model. © 2019 IEEE.
Author Keywords Anomaly detection; Constraint programming; Cyber-physical systems; Model learning


Similar Articles


Id Similarity Authors Title Published
44332 View0.866Wang D.; Fangyu L.I.; Kaibo L.I.U.; Zhang X.Real-Time Cyber-Physical Security Solution Leveraging An Integrated Learning-Based ApproachACM Transactions on Sensor Networks, 20, 2 (2024)
7360 View0.857Brahmia M.-E.-A.; Babouche S.; Ouchani S.; Zghal M.An Adaptive Attack Prediction Framework In Cyber-Physical Systems2022 9th International Conference on Software Defined Systems, SDS 2022 (2022)
2485 View0.854Hitakshi; Sood V.M.; Mehta K.; Kaur G.A Machine Learning-Based Smart Framework For Intrusion Detection In Cyber-Physical SystemsIntelligent Security Solutions for Cyber-Physical Systems (2024)
33330 View0.85Latha R.; Bommi R.M.Intrusion Detection For Cyber Physical Systems Using Light Gradient Boost ModelCommunications in Computer and Information Science, 2177 CCIS (2024)