Attack detection and prevention in the Cyber Physical System. Nurjahan, Nizam, F., Chaki, S., Mamun, S. A., & Kaiser, M. S. In 2016 International Conference on Computer Communication and Informatics (ICCCI), pages 1–6, 2016.
doi  abstract   bibtex   
This paper proposes cyber-attack detection and prevention of Cyber Physical System. The Chi square detector and Fuzzy logic based attack classifier (FLAC) were used to identify distributed denial of service and False data injection attacks. The fuzzy attributes for selecting the mentioned attacks are activity profiling, average packet rate, change point detection algorithm, cusum algorithm, unexpired session of users, injected incomplete information, reuse of session key. An example scenario has been created using OpNET Simulator. Simulation results depict that the use of Chi-square detector and FLAC are able to detect the mentioned cyber physical attacks with high accuracy. Compared to existing Fuzzy logic based attack detector, the proposed model outperforms the traditional distributed denial of service and false data detector.
@inproceedings{nurjahan_attack_2016,
	title = {Attack detection and prevention in the {Cyber} {Physical} {System}},
	doi = {10.1109/ICCCI.2016.7480022},
	abstract = {This paper proposes cyber-attack detection and prevention of Cyber Physical System. The Chi square detector and Fuzzy logic based attack classifier (FLAC) were used to identify distributed denial of service and False data injection attacks. The fuzzy attributes for selecting the mentioned attacks are activity profiling, average packet rate, change point detection algorithm, cusum algorithm, unexpired session of users, injected incomplete information, reuse of session key. An example scenario has been created using OpNET Simulator. Simulation results depict that the use of Chi-square detector and FLAC are able to detect the mentioned cyber physical attacks with high accuracy. Compared to existing Fuzzy logic based attack detector, the proposed model outperforms the traditional distributed denial of service and false data detector.},
	booktitle = {2016 {International} {Conference} on {Computer} {Communication} and {Informatics} ({ICCCI})},
	author = {{Nurjahan} and Nizam, F. and Chaki, S. and Mamun, S. Al and Kaiser, M. S.},
	year = {2016},
	keywords = {Cryptography, FLAC, Jamming, OpNET Simulator, Protocols, activity profiling, attack classifier, average packet rate, change point detection algorithm, chi square detector, computer network security, cusum algorithm, cyber physical system prevention, cyber-attack detection, cyber-physical systems, distributed denial-of-service, false data injection attack, fuzzy logic, injected incomplete information, session key reuse, statistical analysis},
	pages = {1--6},
}

Downloads: 0