Sara Abdellaoui, Emil Dumitrescu, Cédric Escudero, Eric Zamaï
{"title":"恶意行为的时间评估:应用于道岔现场数据监测","authors":"Sara Abdellaoui, Emil Dumitrescu, Cédric Escudero, Eric Zamaï","doi":"arxiv-2405.02346","DOIUrl":null,"url":null,"abstract":"Monitored data collected from railway turnouts are vulnerable to\ncyberattacks: attackers may either conceal failures or trigger unnecessary\nmaintenance actions. To address this issue, a cyberattack investigation method\nis proposed based on predictions made from the temporal evolution of the\nturnout behavior. These predictions are then compared to the field acquired\ndata to detect any discrepancy. This method is illustrated on a collection of\nreal-life data.","PeriodicalId":501062,"journal":{"name":"arXiv - CS - Systems and Control","volume":"13 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Temporal assessment of malicious behaviors: application to turnout field data monitoring\",\"authors\":\"Sara Abdellaoui, Emil Dumitrescu, Cédric Escudero, Eric Zamaï\",\"doi\":\"arxiv-2405.02346\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Monitored data collected from railway turnouts are vulnerable to\\ncyberattacks: attackers may either conceal failures or trigger unnecessary\\nmaintenance actions. To address this issue, a cyberattack investigation method\\nis proposed based on predictions made from the temporal evolution of the\\nturnout behavior. These predictions are then compared to the field acquired\\ndata to detect any discrepancy. This method is illustrated on a collection of\\nreal-life data.\",\"PeriodicalId\":501062,\"journal\":{\"name\":\"arXiv - CS - Systems and Control\",\"volume\":\"13 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-05-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Systems and Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2405.02346\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Systems and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2405.02346","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Temporal assessment of malicious behaviors: application to turnout field data monitoring
Monitored data collected from railway turnouts are vulnerable to
cyberattacks: attackers may either conceal failures or trigger unnecessary
maintenance actions. To address this issue, a cyberattack investigation method
is proposed based on predictions made from the temporal evolution of the
turnout behavior. These predictions are then compared to the field acquired
data to detect any discrepancy. This method is illustrated on a collection of
real-life data.