当前位置: X-MOL 学术Wireless Pers. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A Novel Decentralized Analytical Methodology for Cyber Physical Networks Attack Detection
Wireless Personal Communications ( IF 2.2 ) Pub Date : 2021-07-04 , DOI: 10.1007/s11277-021-08716-5
Abdulrahman Saad Alqahtani 1 , Khaled Ali Abuhasel 2 , Mohammed Alquraish 2
Affiliation  

In many functional implementations of considerable engineering significance, cyber physical solutions have recently been developed where protection and privacy are essential. This led to the recent increase in interest in the development of advanced and emerging technology for anomaly and intrusion detection. The paper suggests a new frame for the distributed blind intrusion detection by modelling sensor measurements as the graph signal and using the statistical features of the graph signal for the detection of intrusion. The graphic similarity matrices is generated using the measured data of the sensors as well as the proximity of the sensors to completely take account of the underlying network structure. The scope of the collected data is modelled on the random field Gaussian Markov and the required precision matrix can be determined by adjusting to a graph called Laplacian matrix. For research statistics, the suggested technique for intrusion detection is based on the modified Bayesian probability ratio test and the closed-form expressions are derived. In the end, the time analysis of the actions of the network is calculated by computing the Bhattacharyya distance at consecutive times among the measurement distributions. Experiments are carried out, evaluated and equate the efficiency of the proposed system to the modern method. The findings indicate a detection value better than that offered by other existing systems via the proposed intrusion detection frame.



中文翻译:

一种用于网络物理网络攻击检测的新型分散分析方法

在许多具有重大工程意义的功能实现中,最近开发了网络物理解决方案,其中保护和隐私是必不可少的。这导致最近对开发用于异常和入侵检测的先进和新兴技术的兴趣增加。该论文通过将传感器测量值建模为图信号并利用图信号的统计特征进行入侵检测,提出了分布式盲入侵检测的新框架。图形相似度矩阵是使用传感器的测量数据以及传感器的接近度生成的,以完全考虑底层网络结构。收集数据的范围以随机场高斯马尔可夫为模型,所需的精度矩阵可以通过调整为称为拉普拉斯矩阵的图形来确定。对于研究统计,建议的入侵检测技术基于修正的贝叶斯概率比检验,并推导出封闭形式的表达式。最后,通过计算测量分布中连续时间的 Bhattacharyya 距离来计算网络动作的时间分析。进行实验,评估并将所提出的系统的效率等同于现代方法。研究结果表明,通过提议的入侵检测框架,检测值优于其他现有系统提供的检测值。建议的入侵检测技术基于改进的贝叶斯概率比测试,并推导出闭式表达式。最后,通过计算测量分布中连续时间的 Bhattacharyya 距离来计算网络动作的时间分析。进行实验,评估并将所提出的系统的效率等同于现代方法。研究结果表明,通过提议的入侵检测框架,检测值优于其他现有系统提供的检测值。建议的入侵检测技术基于改进的贝叶斯概率比测试,并推导出闭式表达式。最后,通过计算测量分布中连续时间的 Bhattacharyya 距离来计算网络动作的时间分析。进行实验,评估并将所提出的系统的效率等同于现代方法。研究结果表明,通过提议的入侵检测框架,检测值优于其他现有系统提供的检测值。网络动作的时间分析是通过计算测量分布中连续时间的 Bhattacharyya 距离来计算的。进行实验,评估并将所提出的系统的效率等同于现代方法。研究结果表明,通过提议的入侵检测框架,检测值优于其他现有系统提供的检测值。网络动作的时间分析是通过计算测量分布中连续时间的 Bhattacharyya 距离来计算的。进行实验,评估并将所提出的系统的效率等同于现代方法。研究结果表明,通过提议的入侵检测框架,检测值优于其他现有系统提供的检测值。

更新日期:2021-07-04
down
wechat
bug