Detecting and Mitigating Network Attacks with a Multi-Prong Approach

To solve a problem, you must first see the problem. More than that, whatever fallout the problem is causing must be controlled while you solve it. That’s the approach an international team of researchers has taken for combatting network attacks. They published their results in IEEE/CAA Journal of Automatica Sinica.

“The communication network and the physical system in a networked control system are vulnerable to potential malicious attacks–including jamming, replay and others,” said Dr. Chandreyee Bhowmick, Department of Electrical and Computer Engineering at the Missouri University of Science and Technology.

“One common attribute of all these attacks is that they all tend to deviate the traffic flow in the communications links from the normal value, thus increasing network-induced delays and packet losses.”

Bhowmick and colleagues developed a hybrid learning approach to not only detect attacks, but to compensate for the issues the attacks cause. According to Bhowmick, many cyber-attacks target information availability rather than data secrecy.

“For such attacks, even the most complicated encryption algorithms fail,” Bhowmick said. “To address this issue, in this study, we developed novel attack detection and estimation schemes by using a learning approach that captures the vulnerable communication links, which is challenging because the state matrix is unknown.”

The state matrix is the state of the system, which includes the speed and type of information flow. A system under attack has even more unpredictable information flow, or lack thereof. In Bhowmick’s proposed scheme, an adaptive observer can detect the onset of attacks and learns how the attacks are disrupting the system. This allows the system to react and perform optimally, even under duress.

However, the proposed method isn’t perfect, and the researchers plan to fine-tune their approach to operate in even more complicated attacks.

“Although this approach can detect a broad range of t attacks on both the network and the physical system, detection of sophisticated attacks remains the scope of future work,” Bhowmick said. “Studying the signature of such attacks and using probabilistic approach to detect them is one of the prospects of future work.”

  1. obviously like your web site but you need to take a look at the spelling on quite
    a few of your posts. Several of them are rife with spelling issues and I find it very troublesome to tell the reality
    however I’ll certainly come again again.

  2. Thanks for ones marvelous posting! I really enjoyed reading
    it, you happen to be a great author. I will make certain to bookmark your blog and will come back someday.
    I want to encourage continue your great writing, have a nice holiday weekend!

  3. Greetings from Los angeles! I’m bored to death at work so
    I decided to check out your website on my iphone during lunch break.
    I enjoy the information you provide here and can’t wait to take a look when I get home.
    I’m shocked at how fast your blog loaded on my phone
    .. I’m not even using WIFI, just 3G .. Anyhow, excellent site!

  4. What’s up all, here every one is sharing these kinds of experience, therefore it’s pleasant
    to read this blog, and I used to pay a quick visit this blog all the time.

Leave a Reply

Your email address will not be published.

©2020 Global Cyber Security Report. Use Our Intel. All Rights Reserved. Washington, D.C.