Advertisement

An Approach to Classification of the Information Security State of Elements of Cyber-Physical Systems Using Side Electromagnetic Radiation

  • Viktor Semenov
  • Mikhail SukhoparovEmail author
  • Ilya Lebedev
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11118)

Abstract

The paper deals with problematic issues of information security in cyber-physical systems. Performance analysis of autonomous objects has been carried out. An information security monitoring system model based on the characteristics resulting from the analysis of electromagnetic radiation from electronic components in standalone devices of cyber-physical systems is presented. A typical scheme for determining the state of a system is shown. Due to the features of equipment sustaining the infrastructure, assessment of an information security state is aimed at analyzing normal system operation rather than searching for signatures and characteristics of anomalies during various types of information attacks. An experiment that provides statistical information on the operation of remote devices of cyber-physical systems has been disclosed, whereby data for decision-making are accumulated by comparing statistical information. The experimental results on information influence on a typical system are presented. The proposed approach for analyzing statistical data of standalone devices based on a naive Bayesian classifier can be used to determine information security states. A special feature of the approach is the ability to rapid adaptation and application of various mathematical tools and machine learning methods to achieve a desired quality of probabilistic evaluation.

Implementation of this type of monitoring does not require a development of complex system applications while allowing implementation of various architectures for system construction that are capable of processing on-board an autonomous object or of communicating data and calculating the state on external computer nodes of monitoring and control systems.

Keywords

Information security Cyber-physical systems Information security monitoring systems 

References

  1. 1.
    Kotenko, I.V., Sayenko, I.B.: Creation of new systems for monitoring and managing cybersecurity. Bull. Russ. Acad. Sci. 84(11), 993–1001 (2014)Google Scholar
  2. 2.
    Rogachev, G.N.: Production method of describing automated controllers in the analysis of continuous-discrete control systems. Autom. Control Comput. Sci. 48(5), 249–256 (2014)CrossRefGoogle Scholar
  3. 3.
    Leschev, S.V.: Electronic culture and virtual reality: the third digital wave of the NBIC paradigm. Bull. Hum. Fac. Ivanovo State Chem. Technol. Univ. 7, 5–9 (2014)Google Scholar
  4. 4.
    Krivtsova, I., et al.: Implementing a broadcast storm attack on a mission-critical wireless sensor network. In: Mamatas, L., Matta, I., Papadimitriou, P., Koucheryavy, Y. (eds.) WWIC 2016. LNCS, vol. 9674, pp. 297–308. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-33936-8_23CrossRefGoogle Scholar
  5. 5.
    Sukhoparov, M.E., Lebedev, I.S.: Method for detecting abnormal behavior of personal networks. Prob. Inf. Secur. Comput. Syst. 1, 9–15 (2017)Google Scholar
  6. 6.
    Bazhayev, N., Lebedev, I.S., Krivtsova, I.E.: Analysis of statistical data for monitoring the network infrastructure to detect abnormal behavior of the local segment of the system. Sci. Tech. Bull. Inf. Technol. Mech. Opt. 17(1/107), 92–99 (2017)Google Scholar
  7. 7.
    Lebedev, I.S., Bazhayev, N., Sukhoparov, M.E., Petrov, V.I., Gurtov, A.V.: Analysis of the state of information security on the basis of surious emission electronic components. In: Proceedings of the 20th Conference of Open Innovations Association FRUCT, pp. 216–221 (2017)Google Scholar
  8. 8.
    Nikolaevskiy, I., Lukyanenko, A., Polishchuk, T., Polishchuk, V.M., Gurtov, A.V.: isBF: scalable in-packet bloom filter based multicast. Comput. Commun. 70, 79–85 (2015)CrossRefGoogle Scholar
  9. 9.
    Al-Naggar, Y., Koucheryavy, A.: Fuzzy logic and voronoi diagram using for cluster head selection in ubiquitous sensor networks. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN 2014. LNCS, vol. 8638, pp. 319–330. Springer, Cham (2014).  https://doi.org/10.1007/978-3-319-10353-2_28CrossRefGoogle Scholar
  10. 10.
    Chehri, A., Moutah, H.T.: Survivable and scalable wireless solution for E-health and emergency applications. In: Proceedings of the 1st International Workshop on Engineering Interactive Computing Systems for Medicine and Health Care (EICS4MED 2011), Pisa, Italy, pp. 25–29 (2011)Google Scholar
  11. 11.
    Sukhoparov, M.E., Lebedev, I.S.: Analysis of the state of information security based on spurious emission of electronic components. Inf. Secur. Prob. Comput. Syst. 2, 92–98 (2017)Google Scholar
  12. 12.
    Royakkers, L., van Est, R.: A literature review on new robotics: automation from love to war. Int. J. Social Robot. 7(5), 549–570 (2015)CrossRefGoogle Scholar
  13. 13.
    Chernyak, L.: Cyberphysical systems at the start. Open Syst. 2, 10–13 (2014)Google Scholar
  14. 14.
    Lee, E.A., Neuendorffer, S., Wirthlin, M.J.: Actor-oriented design of embedded hardware and software systems. J. Circ. Syst. Comput. 12, 231–260 (2003)CrossRefGoogle Scholar
  15. 15.
    Yusupov, R.M., Ronzhin, A.L.: From smart devices to the intellectual space. Bull. Russ. Acad. Sci. 80(1), 45–51 (2010)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Viktor Semenov
    • 1
    • 2
  • Mikhail Sukhoparov
    • 3
    Email author
  • Ilya Lebedev
    • 2
  1. 1.ITMO UniversitySaint PetersburgRussia
  2. 2.SPIIRASSaint PetersburgRussia
  3. 3.SPbF AO «NPK «TRISTAN»Saint PetersburgRussia

Personalised recommendations