Modeling Adversarial Physical Movement in a Railway Station

Author:

Cheh Carmen1,Chen Binbin2,Temple William G.3,Sanders William H.4

Affiliation:

1. Department of Computer Science and Coordinated Science Laboratory, University of Illinois, Urbana, IL

2. Singapore University of Technology and Design (SUTD) and Advanced Digital Sciences Center (ADSC), Singapore

3. Advanced Digital Sciences Center (ADSC), Singapore

4. Department of Electrical and Computer Engineering and Coordinated Science Laboratory, University of Illinois, Urbana, IL

Abstract

Many real-world attacks on cyber-physical systems involve physical intrusions that directly cause damage or facilitate cyber attacks. Hence, in this work, we investigate the security risk of organizations with respect to different adversarial models of physical movement behavior. We study the case in which an intrusion detection mechanism is in place to alert the system administrator when users deviate from their normal movement behavior. We then analyze how different user behaviors may present themselves as different levels of threats in terms of their normal movement behavior within a given building topology. To quantify the differences in movement behavior, we define a WeightTopo metric that takes into account the building topology in addition to the movement pattern. We demonstrate our approach on a railway system case study and show how certain user roles, when abused by attackers, are especially vulnerable in terms of the physical intrusion detection probability. We also evaluate quantitatively how the similarity between an attacker’s movement behavior and a user’s movement behavior affects the detection probability of the evaluated intrusion detection system. Certain individual users are found to pose a higher threat, implying the need for customized monitoring.

Funder

Maryland Procurement Office

National Research Foundation

Human-Centered Cyber-physical Systems Programme at the Advanced Digital Sciences Center from Singapore's Agency for Science

National Cybersecurity R8D Directorate

National Cybersecurity R8D Programme

Prime Minister's Office, Singapore

Technology and Research (A*STAR).

Publisher

Association for Computing Machinery (ACM)

Subject

Artificial Intelligence,Control and Optimization,Computer Networks and Communications,Hardware and Architecture,Human-Computer Interaction

Reference27 articles.

1. Graeme Baker. 2008. Schoolboy hacks into city’s tram system. The Telegraph (January 2008). Retrieved from http://www.telegraph.co.uk/news/worldnews/1575293/Schoolboy-hacks-into-citys-tram-system.html. Graeme Baker. 2008. Schoolboy hacks into city’s tram system. The Telegraph (January 2008). Retrieved from http://www.telegraph.co.uk/news/worldnews/1575293/Schoolboy-hacks-into-citys-tram-system.html.

2. Security evaluation of biometric authentication systems under real spoofing attacks

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Safe Maintenance of Railways using COTS Mobile Devices: The Remote Worker Dashboard;ACM Transactions on Cyber-Physical Systems;2023-10-14

2. Intrusion Detection Systems: A State-of-the-Art Taxonomy and Survey;Arabian Journal for Science and Engineering;2022-11-17

3. A review on cybersecurity in railways;Proceedings of the Institution of Mechanical Engineers, Part F: Journal of Rail and Rapid Transit;2022-04-26

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3