A novel approach for detecting cyberattacks in embedded systems based on anomalous patterns of resource utilization - Part I

dc.contributor.authorAloseel, Abdulmohsan
dc.contributor.authorAl-Rubaye, Saba
dc.contributor.authorZolotas, Argyrios
dc.contributor.authorHe, Hongmei
dc.contributor.authorShaw, Carl
dc.date.accessioned2021-08-19T18:31:34Z
dc.date.available2021-08-19T18:31:34Z
dc.date.issued2021-06-11
dc.description.abstractThis paper presents a novel security approach called Anomalous Resource Consumption Detection (ARCD), which acts as an additional layer of protection to detect cyberattacks in embedded systems (ESs). The ARCD approach is based on the differentiation between the predefined standard resource consumption pattern and the anomalous consumption pattern of system resource utilization. The effectiveness of the proposed approach is tested in a rigorous manner by simulating four types of cyberattacks: a denial-of-service attack, a brute-force attack, a remote code execution attack, and a man-in-the-middle attack, which are executed on a Smart PiCar (used as the testbed). A septenary tuple model consisting of seven parameters, representing the embedded system’s architecture, has been created as the core of the detection mechanism. The approach’s efficiency and effectiveness has been validated in terms of range and pattern by analyzing the collected data statistically in terms of mean, median, mode, standard deviation, range, minimum, and maximum values. The results demonstrated the potential for defining a standard pattern of resource utilization and performance of the embedded system due to a significant similarity of the parameters’ values at normal states. In contrast, the attacked cases showed a definite, observable, and detectable impact on resource consumption and performance of the embedded system, causing an anomalous pattern. Thus, by merging these two findings, the ARCD approach has been developed. ARCD facilitates building secure operating systems in line with the ES’s capabilities. Furthermore, the ARCD approach can work along with existing countermeasures to augment the security of the operating system layer.en_UK
dc.identifier.citationAloseel A, Al-Rubaye S, Zolotas A, et al., (2021) A novel approach for detecting cyberattacks in embedded systems based on anomalous patterns of resource utilization - Part I. IEEE Access, Volume 9, pp. 103204-103229en_UK
dc.identifier.issn2169-3536
dc.identifier.urihttps://doi.org/10.1109/ACCESS.2021.3088395
dc.identifier.urihttps://dspace.lib.cranfield.ac.uk/handle/1826/17028
dc.language.isoenen_UK
dc.publisherIEEEen_UK
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectAnomalous resource consumptionen_UK
dc.subjectbrute-force attacken_UK
dc.subjectcyberattacksen_UK
dc.subjectdenial-of-service attacken_UK
dc.subjectembedded systemsen_UK
dc.subjectpassword attacken_UK
dc.subjectremote code executionen_UK
dc.subjecttestbeden_UK
dc.titleA novel approach for detecting cyberattacks in embedded systems based on anomalous patterns of resource utilization - Part Ien_UK
dc.typeArticleen_UK

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Detecting_cyberattacks_in_embedded_systems-Part_I.pdf
Size:
5.13 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.63 KB
Format:
Item-specific license agreed upon to submission
Description: