Ahmed et al., 2017 - Google Patents
NoiSense: Detecting data integrity attacks on sensor measurements using hardware based fingerprintsAhmed et al., 2017
View PDF- Document ID
- 5705797568998898670
- Author
- Ahmed C
- Mathur A
- Ochoa M
- Publication year
- Publication venue
- arXiv preprint arXiv:1712.01598
External Links
Snippet
In recent years fingerprinting of various physical and logical devices has been proposed with the goal of uniquely identifying users or devices of mainstream IT systems such as PCs, Laptops and smart phones. On the other hand, the application of such techniques in Cyber …
- 238000005259 measurement 0 title description 37
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/03—Arrangements for converting the position or the displacement of a member into a coded form
- G06F3/041—Digitisers, e.g. for touch screens or touch pads, characterized by the transducing means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/03—Arrangements for converting the position or the displacement of a member into a coded form
- G06F3/033—Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Machine learning for the detection and identification of Internet of Things devices: A survey | |
US11809552B2 (en) | Systems, methods, and apparatuses for intrusion detection and analytics using power characteristics such as side-channel information collection | |
Ahmed et al. | Noise matters: Using sensor and process noise fingerprint to detect stealthy cyber attacks and authenticate sensors in cps | |
Ahmed et al. | Noiseprint: Attack detection using sensor and process noise fingerprint in cyber physical systems | |
Ahmed et al. | Noisense print: detecting data integrity attacks on sensor measurements using hardware-based fingerprints | |
Singh et al. | Machine-learning-assisted security and privacy provisioning for edge computing: A survey | |
US11463472B2 (en) | Unknown malicious program behavior detection using a graph neural network | |
Alguliyev et al. | Cyber-physical systems and their security issues | |
Giraldo et al. | Security and privacy in cyber-physical systems: A survey of surveys | |
Faisal et al. | Securing advanced metering infrastructure using intrusion detection system with data stream mining | |
Muthanna et al. | Towards SDN-enabled, intelligent intrusion detection system for internet of things (IoT) | |
Stefanidis et al. | An HMM-based anomaly detection approach for SCADA systems | |
Srivastav et al. | Novel intrusion detection system integrating layered framework with neural network | |
Otoum et al. | Mitigating False Negative intruder decisions in WSN-based Smart Grid monitoring | |
Ahanger | Defense scheme to protect IoT from cyber attacks using AI principles | |
Ahmed et al. | NoiSense: Detecting data integrity attacks on sensor measurements using hardware based fingerprints | |
Ikrissi et al. | A study of smart campus environment and its security attacks | |
Zhu et al. | Iot equipment monitoring system based on c5. 0 decision tree and time-series analysis | |
Ahmed et al. | Hardware identification via sensor fingerprinting in a cyber physical system | |
Singh et al. | A review on cyber physical system attacks: Issues and challenges | |
Ahmed et al. | Scanning the cycle: Timing-based authentication on PLCs | |
Kallitsis et al. | Adaptive statistical detection of false data injection attacks in smart grids | |
Chen et al. | Fiden: Intelligent fingerprint learning for attacker identification in the industrial Internet of Things | |
Kumar et al. | Device fingerprinting for cyber-physical systems: a survey | |
Rosenthal et al. | ARBA: Anomaly and reputation based approach for detecting infected IoT devices |