dc.contributor.author | Nath, Bhagawan | |
dc.contributor.author | Hämäläinen, Timo | |
dc.contributor.author | Ezekiel, Soundararajan | |
dc.contributor.editor | Griffin, Robert P. | |
dc.contributor.editor | Tatarand, Unal | |
dc.contributor.editor | Yankson, Benjamin | |
dc.date.accessioned | 2022-03-16T12:28:00Z | |
dc.date.available | 2022-03-16T12:28:00Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Nath, B., Hämäläinen, T., & Ezekiel, S. (2022). Data Mining for the Security of Cyber Physical Systems Using Deep-Learning Methods. In R. P. Griffin, U. Tatarand, & B. Yankson (Eds.), <i>ICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and Security</i> (17, pp. 591-598). Academic Conferences International Ltd. The proceedings of the 17th international conference on cyber warfare and security. <a href="https://doi.org/10.34190/iccws.17.1.74" target="_blank">https://doi.org/10.34190/iccws.17.1.74</a> | |
dc.identifier.other | CONVID_104596765 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/80190 | |
dc.description.abstract | Cyber Physical Systems (CPSs) have become widely popular in recent years, and their applicability have been growing exponentially. A CPS is an advanced system that incorporates a computation unit along with a hardware unit, allowing for computing processes to interact with the physical world. However, this increased usage has also led to the security concerns in them, as they allow potential attack vendors to exploit the possibilities of committing misconduct for their own benefit. It is of paramount importance that these systems have comprehensive security mechanisms to mitigate these security threats. A typical attack vector for a CPS is malicious data supplied by compromised sensors that are part of the CPSs. To combat this attack vector, many systems are secured through fault tolerance, including methods such as checkpointing to recover the system. Looking at the diverse nature of attacks and their ever growing complexities, traditional security approaches may not counter them efficiently, which creates a vacuum to be filled with sophisticated state-of-the-art techniques. In this paper, Deep Learning methods such as autoencoders, and Support Vector Machines are proposed to secure CPSs against these attacks. The networks in these applied methods are trained with a normal data profile devoid of any malicious data. Data collected from the system’s sensors at specified intervals is used to form a data series and input to the neural networks. The networks compare and analyze new data to the normal profile to detect anomalies, if there is any. In the presence of anomalous data, the networks generate corrective action(s) for these sensors and the physical states they are recording. Through detection of anomalies, effective security of CPSs may be improved in addition to providing protection for the sensors. Moreover, the proposed method of securing CPSs opens up the possibility of further research by showcasing the applicability of neural networks in securing CPSs. | en |
dc.format.extent | 645 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International Ltd | |
dc.relation.ispartof | ICCWS 2022 : Proceedings of the 17th International Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | The proceedings of the 17th international conference on cyber warfare and security | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | cyber physical system | |
dc.subject.other | autoencoder | |
dc.subject.other | support vector machine | |
dc.subject.other | fault tolerance | |
dc.subject.other | sensor data | |
dc.subject.other | cyber attack | |
dc.title | Data Mining for the Security of Cyber Physical Systems Using Deep-Learning Methods | |
dc.type | conferenceObject | |
dc.identifier.urn | URN:NBN:fi:jyu-202203161891 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tekniikka | fi |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | fi |
dc.contributor.oppiaine | Engineering | en |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-1-914587-26-9 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 591-598 | |
dc.relation.issn | 2048-9870 | |
dc.relation.numberinseries | 1 | |
dc.relation.volume | 17 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2022 International Conference on Cyber Warfare and Security | |
dc.rights.accesslevel | openAccess | fi |
dc.relation.conference | International Conference on Cyber Warfare and Security | |
dc.subject.yso | syväoppiminen | |
dc.subject.yso | verkkohyökkäykset | |
dc.subject.yso | tiedonlouhinta | |
dc.subject.yso | tietojärjestelmät | |
dc.subject.yso | kyberturvallisuus | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p39324 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5520 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3927 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.relation.doi | 10.34190/iccws.17.1.74 | |
dc.type.okm | A4 | |