Show simple item record

dc.contributor.authorNath, Bhagawan
dc.contributor.authorHämäläinen, Timo
dc.contributor.authorEzekiel, Soundararajan
dc.contributor.editorGriffin, Robert P.
dc.contributor.editorTatarand, Unal
dc.contributor.editorYankson, Benjamin
dc.date.accessioned2022-03-16T12:28:00Z
dc.date.available2022-03-16T12:28:00Z
dc.date.issued2022
dc.identifier.citationNath, B., Hämäläinen, T., & Ezekiel, S. (2022). Data Mining for the Security of Cyber Physical Systems Using Deep-Learning Methods. In R. P. Griffin, U. Tatarand, & B. Yankson (Eds.), <i>ICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and Security</i> (17, pp. 591-598). Academic Conferences International Ltd. The proceedings of the 17th international conference on cyber warfare and security. <a href="https://doi.org/10.34190/iccws.17.1.74" target="_blank">https://doi.org/10.34190/iccws.17.1.74</a>
dc.identifier.otherCONVID_104596765
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/80190
dc.description.abstractCyber Physical Systems (CPSs) have become widely popular in recent years, and their applicability have been growing exponentially. A CPS is an advanced system that incorporates a computation unit along with a hardware unit, allowing for computing processes to interact with the physical world. However, this increased usage has also led to the security concerns in them, as they allow potential attack vendors to exploit the possibilities of committing misconduct for their own benefit. It is of paramount importance that these systems have comprehensive security mechanisms to mitigate these security threats. A typical attack vector for a CPS is malicious data supplied by compromised sensors that are part of the CPSs. To combat this attack vector, many systems are secured through fault tolerance, including methods such as checkpointing to recover the system. Looking at the diverse nature of attacks and their ever growing complexities, traditional security approaches may not counter them efficiently, which creates a vacuum to be filled with sophisticated state-of-the-art techniques. In this paper, Deep Learning methods such as autoencoders, and Support Vector Machines are proposed to secure CPSs against these attacks. The networks in these applied methods are trained with a normal data profile devoid of any malicious data. Data collected from the system’s sensors at specified intervals is used to form a data series and input to the neural networks. The networks compare and analyze new data to the normal profile to detect anomalies, if there is any. In the presence of anomalous data, the networks generate corrective action(s) for these sensors and the physical states they are recording. Through detection of anomalies, effective security of CPSs may be improved in addition to providing protection for the sensors. Moreover, the proposed method of securing CPSs opens up the possibility of further research by showcasing the applicability of neural networks in securing CPSs.en
dc.format.extent645
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International Ltd
dc.relation.ispartofICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and Security
dc.relation.ispartofseriesThe proceedings of the 17th international conference on cyber warfare and security
dc.rightsCC BY-NC-ND 4.0
dc.subject.othercyber physical system
dc.subject.otherautoencoder
dc.subject.othersupport vector machine
dc.subject.otherfault tolerance
dc.subject.othersensor data
dc.subject.othercyber attack
dc.titleData Mining for the Security of Cyber Physical Systems Using Deep-Learning Methods
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202203161891
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTekniikkafi
dc.contributor.oppiaineSecure Communications Engineering and Signal Processingfi
dc.contributor.oppiaineEngineeringen
dc.contributor.oppiaineSecure Communications Engineering and Signal Processingen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-914587-26-9
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange591-598
dc.relation.issn2048-9870
dc.relation.numberinseries1
dc.relation.volume17
dc.type.versionpublishedVersion
dc.rights.copyright© 2022 International Conference on Cyber Warfare and Security
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceInternational Conference on Cyber Warfare and Security
dc.subject.ysosyväoppiminen
dc.subject.ysoverkkohyökkäykset
dc.subject.ysotiedonlouhinta
dc.subject.ysotietojärjestelmät
dc.subject.ysokyberturvallisuus
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p39324
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
jyx.subject.urihttp://www.yso.fi/onto/yso/p5520
jyx.subject.urihttp://www.yso.fi/onto/yso/p3927
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.relation.doi10.34190/iccws.17.1.74
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC BY-NC-ND 4.0
Except where otherwise noted, this item's license is described as CC BY-NC-ND 4.0