scholarly journals Cyber Attack Prevention Based on Evolutionary Cybernetics Approach

Symmetry ◽  
2020 ◽  
Vol 12 (11) ◽  
pp. 1931
Author(s):  
Dmitry Zegzhda ◽  
Daria Lavrova ◽  
Evgeny Pavlenko ◽  
Anna Shtyrkina

The paper looks at the problem of cybersecurity in modern cyber–physical systems and proposes an evolutionary model approach to counteract cyber attacks by self-regulating the structure of the system, as well as several evolutionary indicators to assess the state of the system. The application of evolutionary models makes it possible to describe the regularities of systems behavior and their technical development, which is especially important regarding cyber attacks, which are the cause of a discontinuous evolution of complex systems. A practical example describes a system behavior during attacks and the self-regulation of its structure. The methodological approach consists of using evolutionary models to describe how modern cyber–physical systems can counteract cyber attacks and evolve, building on the experience of past security incidents. The main conclusions and recommendations are presented in the Discussion section, and they consist of the fact that using an evolutionary approach will not only increase the security of cyber–physical systems, but also define the principles of building systems that are resistant to cyber attacks.

Author(s):  
Sudha Krishnamurthy ◽  
Soumik Sarkar ◽  
Ashutosh Tewari

Anomalies in cyber-physical systems may arise due to malicious cyber attacks or operational faults in the physical devices. Accurately detecting the anomalies and isolating their root-causes is important for identifying appropriate reactive and preventive measures and building resilient cyber-physical systems. Anomaly detection and isolation in cyber-physical systems is challenging, because the impact of a cyber attack on the operation of a physical system may manifest itself only after some time. In this paper, we present a Bayesian network approach for learning the causal relations between cyber and physical variables as well as their temporal correlations from unlabeled data. We describe the data transformations that we performed to deal with the heterogeneous characteristics of the cyber and physical data, so that the integrated dataset can be used to learn the Bayesian network structure and parameters. We then present scalable algorithms to detect different anomalies and isolate their respective root-cause using a Bayesian network. We also present results from evaluating our algorithms on an unlabeled dataset consisting of anomalies due to cyber attacks and physical faults in a commercial building system.


Author(s):  
Amir Namavar Jahromi ◽  
Hadis Karimipour ◽  
Ali Dehghantanha ◽  
Kim-Kwang Raymond Choo

Author(s):  
Faeq Alrimawi ◽  
Liliana Pasquale ◽  
Deepak Mehta ◽  
Nobukazu Yoshioka ◽  
Bashar Nuseibeh

Author(s):  
Marco A. Gamarra ◽  
Sachin Shetty ◽  
Oscar R. Gonzalez ◽  
Laurent Njilla ◽  
Marcus Pendleton ◽  
...  

Complexity ◽  
2019 ◽  
Vol 2019 ◽  
pp. 1-14 ◽  
Author(s):  
Shen Yan ◽  
Sing Kiong Nguang ◽  
Liruo Zhang

This article studies the problem of nonfragile integral-based event-triggered control for uncertain cyber-physical systems under cyber-attacks. An integral-based event-triggered scheme is proposed to reduce the data transmissions and save the limited network resources. The triggering condition is related to the mean of system state over a finite time interval instead of instant system state. Random cyber-attacks in a communication channel are taken into account and described by a stochastic variable subject to Bernoulli distribution. A novel Lyapunov–Krasovskii functional based on Legendre polynomials is constructed, and the Bessel–Legendre inequality technique is employed to handle the integral term induced by the integral-based event-triggered scheme. Resorting to these treatments, sufficient conditions are established via a set of linear matrix inequalities to guarantee the asymptotic mean-square stability of the closed-loop system. Finally, a numerical example shows that the presented method is effective.


Sign in / Sign up

Export Citation Format

Share Document