Skip to main content

Application of an Autonomous Object Behavior Model to Classify the Cybersecurity State

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 11660))

Abstract

This paper considers the issues of ensuring the cybersecurity of autonomous objects. Prerequisites that determine the application of additional independent methods for assessing the state of autonomous objects were identified. Side channels were described, which enable the monitoring of the state of individual objects. A transition graph was proposed to show the current state of the object based on data from side channels. The type of sound signals used to analyze and classify the state of information security was also shown. An experiment intended to accumulate statistical information on the various types of unmanned object maneuvers was conducted using two audio recorders. The data obtained was processed using two-layer feed-forward neural networks with sigmoid hidden neurons. The autonomous object behavior model can be used as an additional element to determine the state of cybersecurity. Using a segmented model, it was possible to improve the accuracy of determining the cybersecurity state. The proposed model enabled the identification of differences in the states of autonomous object cybersecurity with probabilities that were, on average, more than 0.8.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Heller, K., Svore, K., Keromytis, A., Stolfo, S.: One class support vector machines for detecting anomalous windows registry accesses. In: Proceedings Workshop Data Mining for Computer Security, Melbourne, FL, vol. 9, no. 108 (2003)

    Google Scholar 

  2. Chien, E., O’ Murchu, L., Falliere, N.: W32. Duqu: the precursor to the next Stuxnet 2012. https://www.symantec.com/connect/w32_duqu_precursor_next_stuxnet. Accessed 5 July 2019

  3. Semenov, V., Lebedev, I., Sukhoparov, M.: Identification of the state of individual elements of cyber-physical systems based on external behavioral characteristics. Appl. Inform. 13(5/77), 72–83 (2018)

    Google Scholar 

  4. Hayashi, Y., Homma, N., Watanabe, T., Price, W., Radasky, W.: Introduction to the special section on electromagnetic information security. Proc. IEEE Trans. Electromagn. Compat. 55(3), 539–546 (2013)

    Article  Google Scholar 

  5. Han, Y., Christoudis, I., Diamantaras, K., Zonouz, S., Petropulu, A.: Side-channel-based code-execution monitoring systems: a survey. IEEE Signal Process. Mag. 36(2), 22–35 (2019)

    Article  Google Scholar 

  6. de Souza Faria, G., Kim, H.: Differential audio analysis: a new side-channel attack on PIN pads. Int. J. Inf. Secur. 18(1), 73–84 (2019)

    Article  Google Scholar 

  7. Gupta, H., Sural, S., Atluri, V., Vaidya, J.: A side-channel attack on smartphones: deciphering key taps using built-in microphones. J. Comput. Secur. 26(2), 255–281 (2018)

    Article  Google Scholar 

  8. Semenov, V., Lebedev, I., Sukhoparov, M.: Approach to classification of the information security state of elements for cyber-physical systems by applying side electromagnetic radiation. Sci. Tech. J. Inf. Technol. Mech. Opt. 18(1/113), 98–105 (2018). https://doi.org/10.17586/2226-1494-2018-18-1-98-105

    Article  Google Scholar 

  9. Semenov, V., Sukhoparov, M., Lebedev, I.: An approach to classification of the information security state of elements of cyber-physical systems using side electromagnetic radiation. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART -2018. LNCS, vol. 11118, pp. 289–298. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01168-0_27

    Chapter  Google Scholar 

  10. Lebedev, I., et al.: The analysis of abnormal behavior of the system local segment on the basis of statistical data obtained from the network infrastructure monitoring. In: Galinina, O., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART -2016. LNCS, vol. 9870, pp. 503–511. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46301-8_42

    Chapter  Google Scholar 

  11. Han, Y., Etigowni, S., Liu, H., Zonouz, S., Petropulu, A.: Watch me, but don’t touch me! Contactless control flow monitoring via electromagnetic emanations. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 1095–1108 (2017)

    Google Scholar 

  12. Genkin, D., Shamir, A., Tromer, E.: Acoustic cryptanalysis. J. Cryptol. 30(2), 392–443 (2017)

    Article  Google Scholar 

  13. Sukhoparov, M., Semenov, V., Lebedev, I.: Monitoring of cybersecurity elements of cyberphysical systems using artificial neural networks. Methods Tech. Means Ensuring Inf. Secur. 27, 59–60 (2018)

    Google Scholar 

  14. Semenov, V., Lebedev, I.: Analysis of the state of cybersecurity of transport systems objects. Regional Informatics (RI-2018). In: Proceedings of the XVI St. Petersburg International Conference “Regional Informatics (RI-2018)”, pp. 324–325 (2018)

    Google Scholar 

  15. Semenov, V., Lebedev, I.: Processing of signal information in problems of monitoring information security of unmanned autonomous objects. Sci. Tech. J. Inf. Technol. Mech. Opt. 19(3/121), 492–498 (2019). https://doi.org/10.17586/2226-1494-2019-19-3-492-498

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Viktor V. Semenov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Semenov, V.V., Lebedev, I.S., Sukhoparov, M.E., Salakhutdinova, K.I. (2019). Application of an Autonomous Object Behavior Model to Classify the Cybersecurity State. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2019 2019. Lecture Notes in Computer Science(), vol 11660. Springer, Cham. https://doi.org/10.1007/978-3-030-30859-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30859-9_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30858-2

  • Online ISBN: 978-3-030-30859-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics