2015
DOI: 10.1007/978-3-319-20376-8_62
|View full text |Cite
|
Sign up to set email alerts
|

Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making

Abstract: Building automation systems (BAS) are interlinked networks of hardware and software, which monitor and control events in the buildings. One of the data communication protocols used in BAS is Building Automation and Control networking protocol (BACnet) which is an internationally adopted ISO standard for the communication between BAS devices. Although BAS focus on providing safety for inhabitants, decreasing the energy consumption of buildings and reducing their operational cost, their security suffers due to t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…d) CPS Steganography: When CPS states are manipulated by pattern E1 to store secret data, classical approaches of anomaly detection can be performed to, e.g., determine the plausibility of the actuator values or the resulting sensor values (e.g., a temperature value might increase if the heating of a heater actuator is increased). Such anomaly detection can be achieved through entropy-and ML-based methods [152], [153]. This might be further enhanced using digital twins as references for anomaly detection.…”
Section: Countermeasuresmentioning
confidence: 99%
“…d) CPS Steganography: When CPS states are manipulated by pattern E1 to store secret data, classical approaches of anomaly detection can be performed to, e.g., determine the plausibility of the actuator values or the resulting sensor values (e.g., a temperature value might increase if the heating of a heater actuator is increased). Such anomaly detection can be achieved through entropy-and ML-based methods [152], [153]. This might be further enhanced using digital twins as references for anomaly detection.…”
Section: Countermeasuresmentioning
confidence: 99%
“…Their system show good performances at detection of known attacks such as who-is/who-has attacks, write property attacks, initialize routing table attacks, reinitialise device attacks, device communication control attacks, and flooding conformed service attacks. To help the manual detection of anomalies or attacks, researchers have developed a project to visualise and analyse data from BACNet [75]. This tool is aimed at system operators, it provide graphs, network message flow maps and more features to help in the real time security assessment.…”
Section: Protocol-specific Defencesmentioning
confidence: 99%
“…For instance, if a window is opened (to store a hidden bit) that is usually closed at night, it could trigger an alarm. One detection approach could also be to use an entropy-based analysis of BAS events or machine learning methods [15]. However, such a detection method would require the constant recording of all actuator states over time, i.e.…”
Section: Detectabilitymentioning
confidence: 99%