Abstract
AbstractCyber physical systems are becoming ubiquitous devices in many fields thus creating the need for effective security measures. We propose to exploit their intrinsic dependency on the environment in which they are deployed to detect and mitigate anomalies. To do so, sensor measurements, network metrics, and contextual information are fused in a unified security architecture. In this paper, the model of the proposed framework is presented and a first proof of concept involving a telecommunication infrastructure case study is provided.
Publisher
Springer International Publishing
Reference14 articles.
1. Enhancing RAN performance with AI. https://www.ericsson.com/493ce3/assets/local/reports-papers/ericsson-technology-review/docs/2020/enhancing-ran-performance-with-ai.pdf. Accessed 08 July 2020
2. How to build robust anomaly detectors with machine learning. https://www.ericsson.com/en/blog/2020/4/anomaly-detection-with-machine-learning. Accessed 08 July 2020
3. Italian antenna map. http://www.datiopen.it/it/opendata/Mappa_delle_antenne_in_Italia. Accessed 17 June 2020
4. Amaral, A.A., de Souza Mendes, L., Zarpelão, B.B., Proença Junior, M.L.: Deep IP flow inspection to detect beyond network anomalies. Comput. Commun. 98, 80–96 (2017). https://doi.org/10.1016/j.comcom.2016.12.007, http://www.sciencedirect.com/science/article/pii/S0140366416306612
5. Ashibani, Y., Mahmoud, Q.H.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68, 81–97 (2017). https://doi.org/10.1016/j.cose.2017.04.005, http://www.sciencedirect.com/science/article/pii/S0167404817300809