Attack-detection architectural framework based on anomalous patterns of system performance and resource utilization - Part II

dc.contributor.authorAloseel, Abdulmohsan
dc.contributor.authorAl-Rubaye, Saba
dc.contributor.authorZolotas, Argyrios
dc.contributor.authorShaw, Carl
dc.date.accessioned2021-07-27T09:36:30Z
dc.date.available2021-07-27T09:36:30Z
dc.date.issued2021-06-11
dc.description.abstractThis paper presents a unique security approach for detecting cyber-attacks against embedded systems (ESs). The proposed approach has been shaped within an architectural framework called anomalous resource consumption detection (ARCD). The approach’s detection mechanism detects cyber-attacks by distinguishing anomalous performance and resource consumption patterns from a pre-determinable reference model. The defense mechanism of this approach acts as an additional layer of protection for ESs. This technique’s effectiveness was previously evaluated statistically, and in this paper, we tested this approach’s efficiency computationally by using the support-vector machine algorithm. The datasets were generated and collected based on a testbed model, where it was run repeatedly under different operation conditions (normal cases (Rs) versus attacked cases). The executed attack scenarios are 1) denial-of-service (DoS); 2) brute force (BF); and 3) remote code execution (RCE), and man-in-the-middle (MITM). A septenary tuple model, which consists of seven determinants that are analyzed based on seven statistical criteria, is the core of the detection mechanism. The prediction accuracy in terms of classifying anomalous patterns compared to normal patterns based on the confusion matrix revealed promising results, proving this approach’s effectiveness, where the final results confirmed very high prediction accuracies in terms of distinguishing anomalous patterns from the typical patterns. Integrating the ARCD concept into an operating system’s functionality could help software developers augment the existing security countermeasures of ESs. Adopting the ARCD approach will pave the way for software engineers to build more secure operating systems in line with the embedded system’s capabilities, without depleting its resources.en_UK
dc.identifier.citationAloseel A, Al-Rubaye S, Zolotas A, Shaw C. (2021) Attack-detection architectural framework based on anomalous patterns of system performance and resource utilization - Part II, IEEE Access, Volume 9, pp. 87611-87629en_UK
dc.identifier.issn2169-3536
dc.identifier.urihttps://doi.org/10.1109/ACCESS.2021.3088411
dc.identifier.urihttps://dspace.lib.cranfield.ac.uk/handle/1826/16938
dc.language.isoenen_UK
dc.publisherIEEEen_UK
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectAnomalous detectionen_UK
dc.subjectcybersecurityen_UK
dc.subjectembedded systemsen_UK
dc.subjectmachine learningen_UK
dc.subjectsupport vector machine algorithmen_UK
dc.subjectanomalous resource consumption detection frameworken_UK
dc.titleAttack-detection architectural framework based on anomalous patterns of system performance and resource utilization - Part IIen_UK
dc.typeArticleen_UK

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Attack-detection_architectural_framework-Part_II-2021.pdf
Size:
2.62 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.63 KB
Format:
Item-specific license agreed upon to submission
Description: