Cybersecurity for LTI Systems : Advanced Monitoring Against Stealthy Attacks

Authors

  • Mrs. Roselin Lourd. J Head of the Department, Department of Computer Science and Engineering, RAAK College of Engineering and Technology, Puducherry, India Author
  • Jayasudha. S UG Scholar, Department of Computer Science and Engineering, RAAK College of Engineering and Technology, Puducherry, India Author
  • Karthika. K UG Scholar, Department of Computer Science and Engineering, RAAK College of Engineering and Technology, Puducherry, India Author
  • Yasmin. A UG Scholar, Department of Computer Science and Engineering, RAAK College of Engineering and Technology, Puducherry, India Author

Keywords:

Cybersecurity, LTI Systems, Advanced Monitoring, Stealthy Attacks, Real-time Data Analysis, Anomaly Detection, Machine Learning Algorithms

Abstract

In today's interconnected world, Linear Time-Invariant (LTI) systems serve as critical components in various domains, from industrial automation to critical infrastructure control. These systems are often vulnerable to a growing spectrum of cyber threats, including stealthy attacks that aim to evade traditional security measures. In response to this evolving threat landscape, this paper introduces an advanced monitoring framework for bolstering the cybersecurity of LTI systems.Our research addresses the need for proactive and adaptive security measures, going beyond conventional intrusion detection and prevention mechanisms. We propose a novel approach that combines real-time data analysis, anomaly detection, and machine learning algorithms to identify and mitigate stealthy attacks effectively. This framework not only enhances the resilience of LTI systems but also minimizes the potential damage caused by these covert threats.The key components of our advanced monitoring system include the continuous collection of system data, feature extraction, and the application of sophisticated machine learning models. By analyzing the system's behavior in real time, we can detect subtle deviations from the expected norm, which are indicative of stealthy attacks. Our approach adapts to changing attack tactics and remains effective even when attackers employ sophisticated evasion techniques.

Downloads

Download data is not yet available.

References

Tekawade, N., Kshirsagar, S., Sukate, S., Raut, L., & Vairagar, S. (2018, August). Social engineering solutions for document generation using key-logger security mechanism and QR code. In 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA) (pp. 1-5). IEEE.

Tyagi, G., Ahmad, K., & Doja, M. N. (2014, February). A novel framework for password securing system from key-logger spyware. In 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) (pp. 70-74). IEEE.

Munandar, D., & Syamsi, D. (2014, November). Data logger management software design for maintenance and utility in remote. In 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering (pp. 74-78). IEEE.

Baig, M. M., & Mahmood, W. (2007, February). A robust technique of anti key-logging using key-logging mechanism. In 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference (pp. 314-318). IEEE.

Rajmond, J., & Pitică, D. (2010, May). 8 channel configurable data logger for reliability testing and quality assurance. In 33rd International Spring Seminar on Electronics Technology, ISSE 2010 (pp. 255-258). IEEE.

Wanswett, B., & Kalita, H. K. (2015, December). The threat of obfuscated zero day polymorphic malwares: An analysis. In 2015 International Conference on Computational Intelligence and Communication Networks (CICN) (pp. 1188-1193). IEEE.

Doja, M. N., & Kumar, N. (2008, August). Image authentication schemes against key-logger spyware. In 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (pp. 574-579). IEEE.

Malin, J. T., Johnson, K., Molin, A., & Schreckenghost, D. (2002, March). Integrated tools for mission operations teams and software agents. In Proceedings, IEEE Aerospace Conference (Vol. 5, pp. 5-5). IEEE.

Tell, P., Jalaliniya, S., Andersen, K. S., Christensen, M. D., Mellson, A. B., & Bardram, J. E. (2015, July). Approximator: Predicting interruptibility in software development with commodity computers. In 2015 IEEE 10th International Conference on Global Software Engineering (pp. 90-99). IEEE.

Rai, S., Choubey, V., & Garg, P. (2022, July). A Systematic Review of Encryption and Keylogging for Computer System Security. In 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT) (pp. 157-163). IEEE.

Srivastava, M., Kumari, A., Dwivedi, K. K., Jain, S., & Saxena, V. (2021, October). Analysis and Implementation of Novel Keylogger Technique. In 2021 5th International Conference on Information Systems and Computer Networks (ISCON) (pp. 1-6). IEEE.

Chhabra, D., & Shekhawat, J. (2022, November). A reliable security model that protects ultra-dense enterprise cloud networks from highly vulnerable cyber attacks. In 2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC) (pp. 380-385). IEEE.

Duo, W., Zhou, M., & Abusorrah, A. (2022). A survey of cyber attacks on cyber physical systems: Recent advances and challenges. IEEE/CAA Journal of Automatica Sinica, 9(5), 784-800.

Zhang, C., Qin, J., Ma, Q., Shi, Y., & Li, M. (2022). Resilient distributed state estimation for LTI systems under time-varying deception attacks. IEEE Transactions on Control of Network Systems, 10(1), 381-393.

Xin, L., Yang, B., & Long, Z. (2023). The sensor‐actuators stealthy cyber‐attacks framework on networked control systems: A data‐driven approach. Asian Journal of Control.

Ding, S. X., Li, L., Zhao, D., Louen, C., & Liu, T. (2022). Application of the unified control and detection framework to detecting stealthy integrity cyber-attacks on feedback control systems. Automatica, 142, 110352.

Kim, S., Park, K. J., & Lu, C. (2022). A survey on network security for cyber–physical systems: From threats to resilient design. IEEE Communications Surveys & Tutorials, 24(3), 1534-1573.

Azzam, M., Pasquale, L., Provan, G., & Nuseibeh, B. (2023). Forensic readiness of industrial control systems under stealthy attacks. Computers & Security, 125, 103010.

Ghiasi, M., Niknam, T., Wang, Z., Mehrandezh, M., Dehghani, M., & Ghadimi, N. (2023). A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future. Electric Power Systems Research, 215, 108975.

Ding, S. X. (2022). A note on diagnosis and performance degradation detection in automatic control systems towards functional safety and cyber security. Security and Safety, 1, 2022004.

Downloads

Published

03-05-2024

Issue

Section

Research Articles

How to Cite

Cybersecurity for LTI Systems : Advanced Monitoring Against Stealthy Attacks. (2024). International Journal of Scientific Research in Science and Technology, 11(3), 46-52. https://ijsrst.com/index.php/home/article/view/IJSRST24112170

Similar Articles

1-10 of 106

You may also start an advanced similarity search for this article.