PDF] Power Consumption-based Detection of Sabotage Attacks in
Por um escritor misterioso
Descrição
This work proposes a novel approach for detecting sabotage attacks in additive Manufacturing, based on continuous monitoring of the current delivered to all actuators during the manufacturing process and detection of deviations from a provable benign process. Additive Manufacturing (AM), a.k.a. 3D Printing, is increasingly used to manufacture functional parts of safety-critical systems. AM's dependence on computerization raises the concern that the AM process can be tampered with, and a part's mechanical properties sabotaged. This can lead to the destruction of a system employing the sabotaged part, causing loss of life, financial damage, and reputation loss. To address this threat, we propose a novel approach for detecting sabotage attacks. Our approach is based on continuous monitoring of the current delivered to all actuators during the manufacturing process and detection of deviations from a provable benign process. The proposed approach has numerous advantages: (i) it is non-invasive in a time-critical process, (ii) it can be retrofitted in legacy systems, and (iii) it is airgapped from the computerized components of the AM process, preventing simultaneous compromise. Evaluation on a desktop 3D Printer detects all attacks involving a modification of X or Y motor movement, with false positives at 0%.
Power Consumption Analysis as a Detection Indicator for Cyberattacks on Smart Home Devices
PDF) Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing
PDF) Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing
Computer Vision and Deep Learning for Electricity - PyImageSearch
An overview of security and privacy in smart cities' IoT communications - Al‐Turjman - 2022 - Transactions on Emerging Telecommunications Technologies - Wiley Online Library
PDF) Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures
Enterprise data breach: causes, challenges, prevention, and future directions - Cheng - 2017 - WIREs Data Mining and Knowledge Discovery - Wiley Online Library
PDF] Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing
IoT empowered smart cybersecurity framework for intrusion detection in internet of drones
The Project Gutenberg eBook of Simple Sabotage Field Manual, by Office of Strategic Services
Frontiers Hardware Security in Sensor and its Networks
PDF) Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors
A new stable scheme against false data injection attacks in distributed control microgrid - Tahani - IET Cyber-Physical Systems: Theory & Applications - Wiley Online Library
Physics-based detection of cyber-attacks in manufacturing systems: A machining case study - ScienceDirect