DL BASED IOT ENERGY AUDIT ANALYTICS FOR DETECTING AND IDENTIFYING CYBER-PHYSICAL ATTACKS

Authors

  • Dr. M. Vanitha
  • Ch. Hanusri
  • K. Bindhu

DOI:

https://doi.org/10.46243/jst.2023.v8.i12.pp131-138

Keywords:

Cyber Physical Attacks, Dl Bases Iot Energy, Audit Analytics

Abstract

Internet of Things (IoT) are vulnerable to both cyber and physical attacks. Therefore, a cyber-physical security system against different kinds of attacks is in high demand. Traditionally, attacks are detected via monitoring system logs. However, the system logs, such as network statistics and file access records, can be forged. Furthermore, existing solutions mainly target cyber-attacks. This paper proposes the first energy auditing and analytics based IoT monitoring mechanism. To our best knowledge, this is the first attempt to detect and identify IoT cyber and physical attacks based on energy auditing. Using the energy meter readings, we develop a dual deep learning (DL) model system, which adaptively learns the system behaviors in a normal condition. Unlike the previous single DL models for energy disaggregation, we propose a disaggregation-aggregation architecture. The innovative design makes it possible to detect both cyber and physical attacks. The disaggregation model analyzes the energy consumptions of system subcomponents, e.g., CPU, network, disk, etc., to identify cyber-attacks, while the aggregation model detects the physical attacks by characterizing the difference between the measured power consumption and prediction results. Using energy consumption data only, the proposed system identifies both cyber and physical attacks. The system and algorithm designs are described in detail. In the hardware simulation experiments, the proposed system exhibits promising performances.

Downloads

Published

2023-12-18

How to Cite

Dr. M. Vanitha, Ch. Hanusri, & K. Bindhu. (2023). DL BASED IOT ENERGY AUDIT ANALYTICS FOR DETECTING AND IDENTIFYING CYBER-PHYSICAL ATTACKS. Journal of Science & Technology (JST), 8(12), 131–138. https://doi.org/10.46243/jst.2023.v8.i12.pp131-138

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.