2019
DOI: 10.1145/3355300
|View full text |Cite
|
Sign up to set email alerts
|

A System-level Behavioral Detection Framework for Compromised CPS Devices

Abstract: Cyber-Physical Systems (CPS) play a signi cant role in our critical infrastructure networks from power-distribution to utility networks. e emerging smart-grid concept is a compelling critical CPS infrastructure that relies on two-way communications between smart devices to increase e ciency, enhance reliability, and reduce costs. However, compromised devices in the smart grid poses several security challenges. Consequences of propagating fake data or stealing sensitive smart grid information via compromised de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 29 publications
(7 citation statements)
references
References 61 publications
(82 reference statements)
0
7
0
Order By: Relevance
“…In order to see the effects of different amount of obfuscations, we firstly obfuscated 25% of the function names in the source and header files of Webminerpool. Then, we increased the number of function names to 50%, 75%, and finally, to 100% in which every function name was obfuscated, excluding C memory management functions (i.e., memset, memcpy, malloc and free) [38], [39], [40]. Figure 7 shows the gray-scale image representations of the resulting miner samples.…”
Section: E Minos Against Obfuscationmentioning
confidence: 99%
“…In order to see the effects of different amount of obfuscations, we firstly obfuscated 25% of the function names in the source and header files of Webminerpool. Then, we increased the number of function names to 50%, 75%, and finally, to 100% in which every function name was obfuscated, excluding C memory management functions (i.e., memset, memcpy, malloc and free) [38], [39], [40]. Figure 7 shows the gray-scale image representations of the resulting miner samples.…”
Section: E Minos Against Obfuscationmentioning
confidence: 99%
“…Data integrity attacks [13,21,25,29,40,41,48,49,53,55,[59][60][61][62]70,75,76] Unusual consumption behaviors and measurements [6,24,27,32,34,35,38,46,52,67,68,[71][72][73] Network intrusions [16,18,19,56,63,69] Network infrastructure anomalies [14,15,17,20,22,33,39,47,58,64] Electrical data anomalies [7,23,26,36,…”
Section: Study Object Papermentioning
confidence: 99%
“…• Device Behaviour: Different types of industrial devices behave differently. Even similar devices can act differently, depending on their tasks [17]. Such vagueness can lead to mistakenly identifying benign devices as a compromise.…”
Section: Technicalmentioning
confidence: 99%
“…This is because attackers often use these components in the pages they alert or upload after an attack. Babunet al [17] designed a system-level framework capable of detecting compromised CPS smart grid devices using system and function-level call tracing techniques. The proposed framework combines function and system call analysis to provide detailed activity of a device from both kernel and application-level.…”
Section: Machine Learning and Deep Learning Techniquesmentioning
confidence: 99%