Repository logo
 
Publication

Actively detecting multiscale flooding attacks & attack volumes in resource-constrained ICPS

dc.contributor.authorZahid, Farzana
dc.contributor.authorKuo, Matthew M.Y.
dc.contributor.authorSinha, Roopak
dc.contributor.authorFunchal, Gustavo Silva
dc.contributor.authorPedrosa, Tiago
dc.contributor.authorLeitão, Paulo
dc.date.accessioned2024-10-08T10:08:46Z
dc.date.available2024-10-08T10:08:46Z
dc.date.issued2024
dc.description.abstractThe significant growth in modern communication technologies has led to an increase in zero-day vulnerabilities that degrade the performance of cyber-physical systems (ICPS). Distributed denial of service (DDoS) attacks are one such threat that overwhelms a target with floods of packets, posing a severe risk to the normal operations of the ICPS. Current solutions to detect DDoS attacks are unsuitable for resource-constrained ICPS. This study proposes actively detecting multiscale flooding DDoS attacks in resource-constrained ICPS by analyzing network traffic in the frequency domain. A two-phased technique detects attack presence and attack volume. Both phases use a novel combination of light-weight and theoretically sound statistical methods. The effectiveness of the proposed technique is evaluated using mainstream metrics like true and false positive rates, accuracy, and precision using BOUN DDoS 2020 and CICDDoS 2019 datasets. An implementation of the proposed approach on a programmable logic controllers-based ICPS demonstrated improvements in resource usage and detection time compared to the existing state-of-the-art.pt_PT
dc.description.versioninfo:eu-repo/semantics/publishedVersionpt_PT
dc.identifier.citationZahid, Farzana; Kuo, Matthew M.Y.; Sinha, Roopak; Funchal, Gustavo Silva; Pedrosa, Tiago; Leitão, Paulo (2024). Actively detecting multiscale flooding attacks & attack volumes in resource-constrained ICPS. IEEE Transactions on Industrial Informatics. ISSN 1551-3203. p. 1-9pt_PT
dc.identifier.doi10.1109/TII.2024.3383520pt_PT
dc.identifier.issn1551-3203
dc.identifier.urihttp://hdl.handle.net/10198/30354
dc.language.isoengpt_PT
dc.peerreviewedyespt_PT
dc.publisherIEEEpt_PT
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/pt_PT
dc.subjectComputer crimept_PT
dc.subjectDenial-of-service attackpt_PT
dc.subjectDiscrete Fourier transformpt_PT
dc.subjectDistributed denial of service (DDoS)pt_PT
dc.subjectElectronic mailpt_PT
dc.subjectEuclidean distancept_PT
dc.subjectFast-entropypt_PT
dc.subjectIndustrial cyber-physical system (ICPS)pt_PT
dc.subjectJaccard similaritypt_PT
dc.subjectMarket researchpt_PT
dc.subjectResource-constrainedpt_PT
dc.subjectSecuritypt_PT
dc.subjectSpectral analysispt_PT
dc.subjectSurveyspt_PT
dc.titleActively detecting multiscale flooding attacks & attack volumes in resource-constrained ICPSpt_PT
dc.typejournal article
dspace.entity.typePublication
oaire.citation.endPage9pt_PT
oaire.citation.startPage1pt_PT
oaire.citation.titleIEEE Transactions on Industrial Informaticspt_PT
person.familyNameFunchal
person.familyNamePedrosa
person.familyNameLeitão
person.givenNameGustavo Silva
person.givenNameTiago
person.givenNamePaulo
person.identifierhttps://scholar.google.com/citations?user=eegfgI4AAAAJ&hl=pt-PT&oi=ao
person.identifierA-8390-2011
person.identifier.ciencia-id9416-F3F1-B3EF
person.identifier.ciencia-idB81E-0583-AEDF
person.identifier.ciencia-id8316-8F13-DA71
person.identifier.orcid0000-0002-9691-9956
person.identifier.orcid0000-0003-4873-2705
person.identifier.orcid0000-0002-2151-7944
person.identifier.ridG-2249-2011
person.identifier.scopus-author-id57216637887
person.identifier.scopus-author-id35318153700
person.identifier.scopus-author-id35584388900
rcaap.rightsopenAccesspt_PT
rcaap.typearticlept_PT
relation.isAuthorOfPublication4db24fee-2be5-4feb-966f-acb5a7ff1a5c
relation.isAuthorOfPublicationfee2835e-2230-4414-a58e-bcba895d1f0b
relation.isAuthorOfPublication68d9eb25-ad4f-439b-aeb2-35e8708644cc
relation.isAuthorOfPublication.latestForDiscovery4db24fee-2be5-4feb-966f-acb5a7ff1a5c

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Actively_Detecting_Multiscale_Flooding.pdf
Size:
1.45 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.75 KB
Format:
Item-specific license agreed upon to submission
Description: