A combined discriminative and generative behavior model for cyber physical system defense

In this position paper we explore the use of behavior models as an enabling methodology in the promotion of a more holistic understanding of CPS that can bridge both cyber and physical domains. Thus, we investigate the use of aggregate behavior analysis techniques combined in both cyber and physical domains. Ultimately, our work focuses on the development of a cyber-physical behavior model that leverages behavior aggregation promoting the creation of a long-view sense-making capability driven by both cyber and physical observations. We look to the use of this approach to establish the ability to anticipate malicious activity in CPS, rather that react.

[1]  Dipankar Dasgupta,et al.  Deriving behavior primitives from aggregate network features using support vector machines , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[2]  John R. Goodall,et al.  Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse , 2012 .

[3]  John D. Lafferty,et al.  Correlated Topic Models , 2005, NIPS.

[4]  Salvatore J. Stolfo,et al.  Combining Knowledge Discovery and Knowledge Engineering to Build IDSs , 1999, Recent Advances in Intrusion Detection.

[5]  Stephen Kelley,et al.  Automatic construction of anomaly detectors from graphical models , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[6]  S.Y. Lim,et al.  Network Anomaly Detection System: The State of Art of Network Behaviour Analysis , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.

[7]  Stephen Brooks,et al.  The need to consider both object identity and behavior in establishing the trustworthiness of network devices within a Smart Grid , 2010, CSIIRW '10.

[8]  John McHugh,et al.  Combining Trust and Behavioral Analysis to Detect Security Threats in Open Environments , 2010 .

[9]  Michal Pechoucek,et al.  Dynamic information source selection for intrusion detection systems , 2009, AAMAS.

[10]  Sibel Adali,et al.  Measuring behavioral trust in social networks , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.

[11]  D. J. Robinson,et al.  Cyber-based behavioral modeling , 2010 .

[12]  Sandeep K. S. Gupta,et al.  Security solutions for pervasive healthcare , 2007 .

[13]  J. Cafazzo,et al.  Design of an mHealth App for the Self-management of Adolescent Type 1 Diabetes: A Pilot Study , 2012, Journal of medical Internet research.

[14]  Edward A. Lee,et al.  Addressing Modeling Challenges in Cyber-Physical Systems , 2011 .