Decision tree-based detection of denial of service and command injection attacks on robotic vehicles
Vuong, Tuan Phan, Loukas, George ORCID: 0000-0003-3559-5182 , Gan, Diane ORCID: 0000-0002-0920-7572 and Bezemskij, Anatolij (2015) Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. In: 2015 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Piscataway, NJ, US. ISBN 978-1-4673-6802-5 (doi:https://doi.org/10.1109/WIFS.2015.7368559)
|
PDF (Author's Accepted Manuscript)
15015_Loukas_Decision tree based detection (AAM) 2015.pdf - Accepted Version Download (861kB) | Preview |
Abstract
Mobile cyber-physical systems, such as automobiles, drones and robotic vehicles, are gradually becoming attractive targets for cyber attacks. This is a challenge because intrusion detection systems built for conventional computer systems tend to be unsuitable. They can be too demanding for resource-restricted cyber-physical systems or too inaccurate due to the lack of real- world data on actual attack behaviours. Here, we focus on the security of a small remote-controlled robotic vehicle. Having observed that certain types of cyber attacks against it exhibit physical impact, we have developed an intrusion detection system that takes into account not only cyber input features, such as network traffic and disk data, but also physical input features, such as speed, physical jittering and power consumption. As the system is resource-restricted, we have opted for a decision tree-based approach for generating simple detection rules, which we evaluate against denial of service and command injection attacks. We observe that the addition of physical input features can markedly reduce the false positive rate and increase the overall accuracy of the detection.
Item Type: | Conference Proceedings |
---|---|
Title of Proceedings: | 2015 IEEE International Workshop on Information Forensics and Security (WIFS) |
Additional Information: | © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. IEEE International Workshop on Information Forensics and Security, November 16-19, 2015, Rome, Italy. |
Uncontrolled Keywords: | cyber-physical security, cyber security, cyber-physical systems, vehicles, intrusion detection |
Faculty / School / Research Centre / Research Group: | Faculty of Engineering & Science Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS) |
Last Modified: | 15 Aug 2022 14:45 |
URI: | http://gala.gre.ac.uk/id/eprint/15015 |
Actions (login required)
View Item |
Downloads
Downloads per month over past year