Dataset of anomalies and malicious acts in a cyber-physical subsystem.

Data Brief

Chair of Naval Cyber Defense, École Navale - CC 600, F29240 Brest Cedex 9, France.

Published: October 2017

This article presents a dataset produced to investigate how data and information quality estimations enable to detect aNomalies and malicious acts in cyber-physical systems. Data were acquired making use of a cyber-physical subsystem consisting of liquid containers for fuel or water, along with its automated control and data acquisition infrastructure. Described data consist of temporal series representing five operational scenarios - Normal, aNomalies, breakdown, sabotages, and cyber-attacks - corresponding to 15 different real situations. The dataset is publicly available in the .zip file published with the article, to investigate and compare faulty operation detection and characterization methods for cyber-physical systems.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC5536820PMC
http://dx.doi.org/10.1016/j.dib.2017.07.038DOI Listing

Publication Analysis

Top Keywords

anomalies malicious
8
malicious acts
8
acts cyber-physical
8
cyber-physical subsystem
8
cyber-physical systems
8
dataset anomalies
4
cyber-physical
4
subsystem article
4
article presents
4
presents dataset
4

Similar Publications

Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems.

Sensors (Basel)

January 2025

Group of Analysis, Security and Systems (GASS), Department of Software Engineering and Artificial Intelligence (DISIA), Faculty of Computer Science and Engineering, Office 431, Universidad Complutense de Madrid (UCM), Calle Profesor José García Santesmases, 9, Ciudad Universitaria, 28040 Madrid, Spain.

Conducting penetration testing (pentesting) in cybersecurity is a crucial turning point for identifying vulnerabilities within the framework of Information Technology (IT), where real malicious offensive behavior is simulated to identify potential weaknesses and strengthen preventive controls. Given the complexity of the tests, time constraints, and the specialized level of expertise required for pentesting, analysis and exploitation tools are commonly used. Although useful, these tools often introduce uncertainty in findings, resulting in high rates of false positives.

View Article and Find Full Text PDF

Detecting Unusual Repetitive Patterns of Behavior Indicative of a Loop-Based Attack in IoT.

Sensors (Basel)

November 2024

College of Computer Science and Engineering, University of Jeddah, Jeddah 21959, Saudi Arabia.

Given the high risk of Internet of Things (IoT) device compromise, it is crucial to discuss the attack detection aspect. However, due to the physical limitations of IoT, such as battery life and sensing and processing power, the widely used detection techniques, such as signature-based or anomaly-based detection, are quite ineffective. This research extracted loop-based cases from the transmission session dataset of "CTU-IoT-Malware-Capture-7-1" ("Linux, Mirai") and implemented a loop-based detection machine learning approach.

View Article and Find Full Text PDF
Article Synopsis
  • * The research introduces a new model called NATURE, which uses a multi-level clustered structure to improve attack resistance, reduce communication load, and enhance efficiency in industrial settings.
  • * NATURE incorporates a multifactor trust estimation framework that evaluates node performance based on behavior, energy use, and communication reliability, enabling adaptive trust assessments and prioritizing recent node actions for better network dependability.
View Article and Find Full Text PDF
Article Synopsis
  • The paper addresses the growing issue of detecting malicious activity in encrypted network traffic, which is complicated by an imbalance in traffic data and the covert nature of malicious actions.
  • To tackle this, the authors propose a semi-supervised approach that uses two neural networks to extract both sequence and topological features from network traffic, improving the detection capabilities of encrypted traffic anomalies.
  • Their model, which combines labeled and unlabeled data for training and includes a confidence estimation module, shows significant performance improvements over existing methods, achieving higher F1 scores in various testing conditions on benchmark datasets UNSW-NB15 and CICIDS2017.
View Article and Find Full Text PDF

Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system.

PeerJ Comput Sci

August 2024

Department of Quantitative Analysis, College of Business Administration, King Saud University, Riyadh, Saudi Arabia.

In the distributed computing era, cloud computing has completely changed organizational operations by facilitating simple access to resources. However, the rapid development of the IoT has led to collaborative computing, which raises scalability and security challenges. To fully realize the potential of the Internet of Things (IoT) in smart home technologies, there is still a need for strong data security solutions, which are essential in dynamic offloading in conjunction with edge, fog, and cloud computing.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!