An Approach to Classification of the Information Security State of Elements of Cyber-Physical Systems Using Side Electromagnetic Radiation
The paper deals with problematic issues of information security in cyber-physical systems. Performance analysis of autonomous objects has been carried out. An information security monitoring system model based on the characteristics resulting from the analysis of electromagnetic radiation from electronic components in standalone devices of cyber-physical systems is presented. A typical scheme for determining the state of a system is shown. Due to the features of equipment sustaining the infrastructure, assessment of an information security state is aimed at analyzing normal system operation rather than searching for signatures and characteristics of anomalies during various types of information attacks. An experiment that provides statistical information on the operation of remote devices of cyber-physical systems has been disclosed, whereby data for decision-making are accumulated by comparing statistical information. The experimental results on information influence on a typical system are presented. The proposed approach for analyzing statistical data of standalone devices based on a naive Bayesian classifier can be used to determine information security states. A special feature of the approach is the ability to rapid adaptation and application of various mathematical tools and machine learning methods to achieve a desired quality of probabilistic evaluation.
Implementation of this type of monitoring does not require a development of complex system applications while allowing implementation of various architectures for system construction that are capable of processing on-board an autonomous object or of communicating data and calculating the state on external computer nodes of monitoring and control systems.
KeywordsInformation security Cyber-physical systems Information security monitoring systems
- 1.Kotenko, I.V., Sayenko, I.B.: Creation of new systems for monitoring and managing cybersecurity. Bull. Russ. Acad. Sci. 84(11), 993–1001 (2014)Google Scholar
- 3.Leschev, S.V.: Electronic culture and virtual reality: the third digital wave of the NBIC paradigm. Bull. Hum. Fac. Ivanovo State Chem. Technol. Univ. 7, 5–9 (2014)Google Scholar
- 4.Krivtsova, I., et al.: Implementing a broadcast storm attack on a mission-critical wireless sensor network. In: Mamatas, L., Matta, I., Papadimitriou, P., Koucheryavy, Y. (eds.) WWIC 2016. LNCS, vol. 9674, pp. 297–308. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33936-8_23CrossRefGoogle Scholar
- 5.Sukhoparov, M.E., Lebedev, I.S.: Method for detecting abnormal behavior of personal networks. Prob. Inf. Secur. Comput. Syst. 1, 9–15 (2017)Google Scholar
- 6.Bazhayev, N., Lebedev, I.S., Krivtsova, I.E.: Analysis of statistical data for monitoring the network infrastructure to detect abnormal behavior of the local segment of the system. Sci. Tech. Bull. Inf. Technol. Mech. Opt. 17(1/107), 92–99 (2017)Google Scholar
- 7.Lebedev, I.S., Bazhayev, N., Sukhoparov, M.E., Petrov, V.I., Gurtov, A.V.: Analysis of the state of information security on the basis of surious emission electronic components. In: Proceedings of the 20th Conference of Open Innovations Association FRUCT, pp. 216–221 (2017)Google Scholar
- 9.Al-Naggar, Y., Koucheryavy, A.: Fuzzy logic and voronoi diagram using for cluster head selection in ubiquitous sensor networks. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN 2014. LNCS, vol. 8638, pp. 319–330. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10353-2_28CrossRefGoogle Scholar
- 10.Chehri, A., Moutah, H.T.: Survivable and scalable wireless solution for E-health and emergency applications. In: Proceedings of the 1st International Workshop on Engineering Interactive Computing Systems for Medicine and Health Care (EICS4MED 2011), Pisa, Italy, pp. 25–29 (2011)Google Scholar
- 11.Sukhoparov, M.E., Lebedev, I.S.: Analysis of the state of information security based on spurious emission of electronic components. Inf. Secur. Prob. Comput. Syst. 2, 92–98 (2017)Google Scholar
- 13.Chernyak, L.: Cyberphysical systems at the start. Open Syst. 2, 10–13 (2014)Google Scholar
- 15.Yusupov, R.M., Ronzhin, A.L.: From smart devices to the intellectual space. Bull. Russ. Acad. Sci. 80(1), 45–51 (2010)Google Scholar