Sara Abdellaoui, Emil Dumitrescu, Cédric Escudero, Eric Zamaï
{"title":"Temporal assessment of malicious behaviors: application to turnout field data monitoring","authors":"Sara Abdellaoui, Emil Dumitrescu, Cédric Escudero, Eric Zamaï","doi":"arxiv-2405.02346","DOIUrl":null,"url":null,"abstract":"Monitored data collected from railway turnouts are vulnerable to\ncyberattacks: attackers may either conceal failures or trigger unnecessary\nmaintenance actions. To address this issue, a cyberattack investigation method\nis proposed based on predictions made from the temporal evolution of the\nturnout behavior. These predictions are then compared to the field acquired\ndata to detect any discrepancy. This method is illustrated on a collection of\nreal-life data.","PeriodicalId":501062,"journal":{"name":"arXiv - CS - Systems and Control","volume":"13 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Systems and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2405.02346","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Monitored data collected from railway turnouts are vulnerable to
cyberattacks: attackers may either conceal failures or trigger unnecessary
maintenance actions. To address this issue, a cyberattack investigation method
is proposed based on predictions made from the temporal evolution of the
turnout behavior. These predictions are then compared to the field acquired
data to detect any discrepancy. This method is illustrated on a collection of
real-life data.