网络攻击下CPS恶意预测

N. Bezzo
{"title":"网络攻击下CPS恶意预测","authors":"N. Bezzo","doi":"10.1109/ICCPS.2018.00049","DOIUrl":null,"url":null,"abstract":"Modern autonomous cyber-physical systems (CPS) have been demonstrated to be vulnerable to cyber-attacks like sensor spoofing in which an attacker compromises sensor readings while remaining stealthy to hijack the system toward undesired states. The majority of security techniques developed today are, however, reactive and concerned with detection and interdiction of attacks without considering predicting the intention of the attack. To deal with such problem, we propose a Reachability-based approach and a Bayesian Inverse Reinforcement Learning technique that leverages the history of sensor data and control inputs to assess the risk and predict the goal of sensor spoofing attacks, determine which sensors are compromised, and recover the system.","PeriodicalId":199062,"journal":{"name":"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Predicting Malicious Intention in CPS under Cyber-Attack\",\"authors\":\"N. Bezzo\",\"doi\":\"10.1109/ICCPS.2018.00049\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Modern autonomous cyber-physical systems (CPS) have been demonstrated to be vulnerable to cyber-attacks like sensor spoofing in which an attacker compromises sensor readings while remaining stealthy to hijack the system toward undesired states. The majority of security techniques developed today are, however, reactive and concerned with detection and interdiction of attacks without considering predicting the intention of the attack. To deal with such problem, we propose a Reachability-based approach and a Bayesian Inverse Reinforcement Learning technique that leverages the history of sensor data and control inputs to assess the risk and predict the goal of sensor spoofing attacks, determine which sensors are compromised, and recover the system.\",\"PeriodicalId\":199062,\"journal\":{\"name\":\"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCPS.2018.00049\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCPS.2018.00049","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

现代自主网络物理系统(CPS)已经被证明很容易受到网络攻击,比如传感器欺骗,攻击者在窃取传感器读数的同时保持隐身,将系统劫持到不希望的状态。然而,目前开发的大多数安全技术都是被动的,只关注检测和阻止攻击,而不考虑预测攻击的意图。为了解决这一问题,我们提出了一种基于可达性的方法和贝叶斯逆强化学习技术,该技术利用传感器数据和控制输入的历史来评估风险并预测传感器欺骗攻击的目标,确定哪些传感器受到损害,并恢复系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Predicting Malicious Intention in CPS under Cyber-Attack
Modern autonomous cyber-physical systems (CPS) have been demonstrated to be vulnerable to cyber-attacks like sensor spoofing in which an attacker compromises sensor readings while remaining stealthy to hijack the system toward undesired states. The majority of security techniques developed today are, however, reactive and concerned with detection and interdiction of attacks without considering predicting the intention of the attack. To deal with such problem, we propose a Reachability-based approach and a Bayesian Inverse Reinforcement Learning technique that leverages the history of sensor data and control inputs to assess the risk and predict the goal of sensor spoofing attacks, determine which sensors are compromised, and recover the system.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信