Aloseel, AbdulmohsanAl-Rubaye, SabaZolotas, ArgyriosHe, HongmeiShaw, Carl2021-08-192021-08-192021-06-11Aloseel A, Al-Rubaye S, Zolotas A, et al., (2021) A novel approach for detecting cyberattacks in embedded systems based on anomalous patterns of resource utilization - Part I. IEEE Access, Volume 9, pp. 103204-1032292169-3536https://doi.org/10.1109/ACCESS.2021.3088395https://dspace.lib.cranfield.ac.uk/handle/1826/17028This paper presents a novel security approach called Anomalous Resource Consumption Detection (ARCD), which acts as an additional layer of protection to detect cyberattacks in embedded systems (ESs). The ARCD approach is based on the differentiation between the predefined standard resource consumption pattern and the anomalous consumption pattern of system resource utilization. The effectiveness of the proposed approach is tested in a rigorous manner by simulating four types of cyberattacks: a denial-of-service attack, a brute-force attack, a remote code execution attack, and a man-in-the-middle attack, which are executed on a Smart PiCar (used as the testbed). A septenary tuple model consisting of seven parameters, representing the embedded system’s architecture, has been created as the core of the detection mechanism. The approach’s efficiency and effectiveness has been validated in terms of range and pattern by analyzing the collected data statistically in terms of mean, median, mode, standard deviation, range, minimum, and maximum values. The results demonstrated the potential for defining a standard pattern of resource utilization and performance of the embedded system due to a significant similarity of the parameters’ values at normal states. In contrast, the attacked cases showed a definite, observable, and detectable impact on resource consumption and performance of the embedded system, causing an anomalous pattern. Thus, by merging these two findings, the ARCD approach has been developed. ARCD facilitates building secure operating systems in line with the ES’s capabilities. Furthermore, the ARCD approach can work along with existing countermeasures to augment the security of the operating system layer.enAttribution-NonCommercial-NoDerivatives 4.0 InternationalAnomalous resource consumptionbrute-force attackcyberattacksdenial-of-service attackembedded systemspassword attackremote code executiontestbedA novel approach for detecting cyberattacks in embedded systems based on anomalous patterns of resource utilization - Part IArticle