Cybersecurity for LTI Systems : Advanced Monitoring Against Stealthy Attacks
Keywords:
Cybersecurity, LTI Systems, Advanced Monitoring, Stealthy Attacks, Real-time Data Analysis, Anomaly Detection, Machine Learning AlgorithmsAbstract
In today's interconnected world, Linear Time-Invariant (LTI) systems serve as critical components in various domains, from industrial automation to critical infrastructure control. These systems are often vulnerable to a growing spectrum of cyber threats, including stealthy attacks that aim to evade traditional security measures. In response to this evolving threat landscape, this paper introduces an advanced monitoring framework for bolstering the cybersecurity of LTI systems.Our research addresses the need for proactive and adaptive security measures, going beyond conventional intrusion detection and prevention mechanisms. We propose a novel approach that combines real-time data analysis, anomaly detection, and machine learning algorithms to identify and mitigate stealthy attacks effectively. This framework not only enhances the resilience of LTI systems but also minimizes the potential damage caused by these covert threats.The key components of our advanced monitoring system include the continuous collection of system data, feature extraction, and the application of sophisticated machine learning models. By analyzing the system's behavior in real time, we can detect subtle deviations from the expected norm, which are indicative of stealthy attacks. Our approach adapts to changing attack tactics and remains effective even when attackers employ sophisticated evasion techniques.
Downloads
References
Tekawade, N., Kshirsagar, S., Sukate, S., Raut, L., & Vairagar, S. (2018, August). Social engineering solutions for document generation using key-logger security mechanism and QR code. In 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA) (pp. 1-5). IEEE.
Tyagi, G., Ahmad, K., & Doja, M. N. (2014, February). A novel framework for password securing system from key-logger spyware. In 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) (pp. 70-74). IEEE.
Munandar, D., & Syamsi, D. (2014, November). Data logger management software design for maintenance and utility in remote. In 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering (pp. 74-78). IEEE.
Baig, M. M., & Mahmood, W. (2007, February). A robust technique of anti key-logging using key-logging mechanism. In 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference (pp. 314-318). IEEE.
Rajmond, J., & Pitică, D. (2010, May). 8 channel configurable data logger for reliability testing and quality assurance. In 33rd International Spring Seminar on Electronics Technology, ISSE 2010 (pp. 255-258). IEEE.
Wanswett, B., & Kalita, H. K. (2015, December). The threat of obfuscated zero day polymorphic malwares: An analysis. In 2015 International Conference on Computational Intelligence and Communication Networks (CICN) (pp. 1188-1193). IEEE.
Doja, M. N., & Kumar, N. (2008, August). Image authentication schemes against key-logger spyware. In 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (pp. 574-579). IEEE.
Malin, J. T., Johnson, K., Molin, A., & Schreckenghost, D. (2002, March). Integrated tools for mission operations teams and software agents. In Proceedings, IEEE Aerospace Conference (Vol. 5, pp. 5-5). IEEE.
Tell, P., Jalaliniya, S., Andersen, K. S., Christensen, M. D., Mellson, A. B., & Bardram, J. E. (2015, July). Approximator: Predicting interruptibility in software development with commodity computers. In 2015 IEEE 10th International Conference on Global Software Engineering (pp. 90-99). IEEE.
Rai, S., Choubey, V., & Garg, P. (2022, July). A Systematic Review of Encryption and Keylogging for Computer System Security. In 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT) (pp. 157-163). IEEE.
Srivastava, M., Kumari, A., Dwivedi, K. K., Jain, S., & Saxena, V. (2021, October). Analysis and Implementation of Novel Keylogger Technique. In 2021 5th International Conference on Information Systems and Computer Networks (ISCON) (pp. 1-6). IEEE.
Chhabra, D., & Shekhawat, J. (2022, November). A reliable security model that protects ultra-dense enterprise cloud networks from highly vulnerable cyber attacks. In 2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC) (pp. 380-385). IEEE.
Duo, W., Zhou, M., & Abusorrah, A. (2022). A survey of cyber attacks on cyber physical systems: Recent advances and challenges. IEEE/CAA Journal of Automatica Sinica, 9(5), 784-800.
Zhang, C., Qin, J., Ma, Q., Shi, Y., & Li, M. (2022). Resilient distributed state estimation for LTI systems under time-varying deception attacks. IEEE Transactions on Control of Network Systems, 10(1), 381-393.
Xin, L., Yang, B., & Long, Z. (2023). The sensor‐actuators stealthy cyber‐attacks framework on networked control systems: A data‐driven approach. Asian Journal of Control.
Ding, S. X., Li, L., Zhao, D., Louen, C., & Liu, T. (2022). Application of the unified control and detection framework to detecting stealthy integrity cyber-attacks on feedback control systems. Automatica, 142, 110352.
Kim, S., Park, K. J., & Lu, C. (2022). A survey on network security for cyber–physical systems: From threats to resilient design. IEEE Communications Surveys & Tutorials, 24(3), 1534-1573.
Azzam, M., Pasquale, L., Provan, G., & Nuseibeh, B. (2023). Forensic readiness of industrial control systems under stealthy attacks. Computers & Security, 125, 103010.
Ghiasi, M., Niknam, T., Wang, Z., Mehrandezh, M., Dehghani, M., & Ghadimi, N. (2023). A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future. Electric Power Systems Research, 215, 108975.
Ding, S. X. (2022). A note on diagnosis and performance degradation detection in automatic control systems towards functional safety and cyber security. Security and Safety, 1, 2022004.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Science and Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.