Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференций › статья в сборнике материалов конференции › научная › Рецензирование
An Approach to Classification of the Information Security State of Elements of Cyber-Physical Systems Using Side Electromagnetic Radiation. / Semenov, Viktor; Sukhoparov, Mikhail; Lebedev, Ilya.
Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, Proceedings. ред. / Sergey Balandin; Olga Galinina; Sergey Andreev; Yevgeni Koucheryavy. Springer Nature, 2018. стр. 289-298 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Том 11118 LNCS).Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференций › статья в сборнике материалов конференции › научная › Рецензирование
}
TY - GEN
T1 - An Approach to Classification of the Information Security State of Elements of Cyber-Physical Systems Using Side Electromagnetic Radiation
AU - Semenov, Viktor
AU - Sukhoparov, Mikhail
AU - Lebedev, Ilya
PY - 2018/1/1
Y1 - 2018/1/1
N2 - The paper deals with problematic issues of information security in cyber-physical systems. Performance analysis of autonomous objects has been carried out. An information security monitoring system model based on the characteristics resulting from the analysis of electromagnetic radiation from electronic components in standalone devices of cyber-physical systems is presented. A typical scheme for determining the state of a system is shown. Due to the features of equipment sustaining the infrastructure, assessment of an information security state is aimed at analyzing normal system operation rather than searching for signatures and characteristics of anomalies during various types of information attacks. An experiment that provides statistical information on the operation of remote devices of cyber-physical systems has been disclosed, whereby data for decision-making are accumulated by comparing statistical information. The experimental results on information influence on a typical system are presented. The proposed approach for analyzing statistical data of standalone devices based on a naive Bayesian classifier can be used to determine information security states. A special feature of the approach is the ability to rapid adaptation and application of various mathematical tools and machine learning methods to achieve a desired quality of probabilistic evaluation. Implementation of this type of monitoring does not require a development of complex system applications while allowing implementation of various architectures for system construction that are capable of processing on-board an autonomous object or of communicating data and calculating the state on external computer nodes of monitoring and control systems.
AB - The paper deals with problematic issues of information security in cyber-physical systems. Performance analysis of autonomous objects has been carried out. An information security monitoring system model based on the characteristics resulting from the analysis of electromagnetic radiation from electronic components in standalone devices of cyber-physical systems is presented. A typical scheme for determining the state of a system is shown. Due to the features of equipment sustaining the infrastructure, assessment of an information security state is aimed at analyzing normal system operation rather than searching for signatures and characteristics of anomalies during various types of information attacks. An experiment that provides statistical information on the operation of remote devices of cyber-physical systems has been disclosed, whereby data for decision-making are accumulated by comparing statistical information. The experimental results on information influence on a typical system are presented. The proposed approach for analyzing statistical data of standalone devices based on a naive Bayesian classifier can be used to determine information security states. A special feature of the approach is the ability to rapid adaptation and application of various mathematical tools and machine learning methods to achieve a desired quality of probabilistic evaluation. Implementation of this type of monitoring does not require a development of complex system applications while allowing implementation of various architectures for system construction that are capable of processing on-board an autonomous object or of communicating data and calculating the state on external computer nodes of monitoring and control systems.
KW - Cyber-physical systems
KW - Information security
KW - Information security monitoring systems
UR - http://www.scopus.com/inward/record.url?scp=85054862894&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-01168-0_27
DO - 10.1007/978-3-030-01168-0_27
M3 - Conference contribution
AN - SCOPUS:85054862894
SN - 9783030011673
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 289
EP - 298
BT - Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, Proceedings
A2 - Balandin, Sergey
A2 - Galinina, Olga
A2 - Andreev, Sergey
A2 - Koucheryavy, Yevgeni
PB - Springer Nature
T2 - 18th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2018 and 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018
Y2 - 27 August 2018 through 29 August 2018
ER -
ID: 53918558