Babun et al., 2019 - Google Patents
A system-level behavioral detection framework for compromised CPS devices: Smart-grid caseBabun et al., 2019
View PDF- Document ID
- 4116202469312864627
- Author
- Babun L
- Aksu H
- Uluagac A
- Publication year
- Publication venue
- ACM Transactions on Cyber-Physical Systems
External Links
Snippet
Cyber-Physical Systems (CPS) play a significant role in our critical infrastructure networks from power-distribution to utility networks. The emerging smart-grid concept is a compelling critical CPS infrastructure that relies on two-way communications between smart devices to …
- 230000001010 compromised 0 title abstract description 146
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3495—Performance evaluation by tracing or monitoring for systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Babun et al. | A system-level behavioral detection framework for compromised CPS devices: Smart-grid case | |
Touqeer et al. | Smart home security: challenges, issues and solutions at different IoT layers | |
Kumar et al. | A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing | |
Jan et al. | Toward a lightweight intrusion detection system for the internet of things | |
Garitano et al. | A review of SCADA anomaly detection systems | |
Asif et al. | Network intrusion detection and its strategic importance | |
CN112685682B (en) | Method, device, equipment and medium for identifying forbidden object of attack event | |
US10073980B1 (en) | System for assuring security of sensitive data on a host | |
Babun et al. | Identifying counterfeit smart grid devices: A lightweight system level framework | |
US10027697B1 (en) | Detection of counterfeit and compromised devices using system and function call tracing techniques | |
Avalappampatty Sivasamy et al. | A dynamic intrusion detection system based on multivariate Hotelling’s T2 statistics approach for network environments | |
Zheng et al. | Smart grid: Cyber attacks, critical defense approaches, and digital twin | |
Mangrulkar et al. | Network attacks and their detection mechanisms: A review | |
Starke et al. | Cross‐layered distributed data‐driven framework for enhanced smart grid cyber‐physical security | |
Babun et al. | The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments. | |
Liu et al. | Game attack–defense graph approach for modeling and analysis of cyberattacks and defenses in local metering system | |
Yan et al. | Game-theoretical Model for Dynamic Defense Resource Allocation in Cyber-physical Power Systems Under Distributed Denial of Service Attacks | |
Nair et al. | The resource usage viewpoint of industrial control system security: an inference-based intrusion detection system | |
Al Baalbaki et al. | Autonomic critical infrastructure protection (acip) system | |
Babun et al. | Detection of counterfeit and compromised devices using system and function call tracing techniques | |
Agrawal et al. | A SURVEY ON ATTACKS AND APPROACHES OF INTRUSION DETECTION SYSTEMS. | |
Mao et al. | SmartTracer: Anomaly-Driven Provenance Analysis Based on Device Correlation in Smart Home Systems | |
Yun et al. | Wake-Up Security: Effective Security Improvement Mechanism for Low Power Internet of Things. | |
Banik et al. | Intrusion Detection System in Smart Grid-A Review | |
Nicheporuk et al. | A System for Detecting Anomalies and Identifying Smart Home Devices Using Collective Communication. |