Development of Cybersecurity Simulator-Based Platform for the Protection of Critical Infrastructures
- URL: http://arxiv.org/abs/2405.01046v1
- Date: Thu, 2 May 2024 06:58:46 GMT
- Title: Development of Cybersecurity Simulator-Based Platform for the Protection of Critical Infrastructures
- Authors: Tero Vartiainen, Duong Dang, Mike Mekkanen, Emmanuel Anti,
- Abstract summary: We are developing a platform using real-time simulation of cyber-physical systems to enhance CNI resilience and security.
The platform, initiated in the Vaasa Harbor Microgrid, allows creation of a digital twin and real-time execution of its functions.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Critical infrastructures (CNI) are vulnerable to cyberattacks due to their interconnected communication systems. We are developing a platform using real-time simulation of cyber-physical systems to enhance CNI resilience and security. The platform, initiated in the Vaasa Harbor Microgrid, allows creation of a digital twin and real-time execution of its functions. It provides a co-simulation environment for simulating cyberattack scenarios, aiding in the design of a cybersecurity simulator-based platform and offering services for CNI stakeholders.
Related papers
- Simulating Cyberattacks through a Breach Attack Simulation (BAS) Platform empowered by Security Chaos Engineering (SCE) [1.055551340663609]
Security Chaos Engineering (SCE) allows teams to test defenses and identify vulnerabilities effectively.<n>This paper proposes to integrate SCE into Breach Attack Simulation platforms, leveraging adversary profiles and abilities from existing threat intelligence databases.
arXiv Detail & Related papers (2025-08-05T19:52:57Z) - CANDoSA: A Hardware Performance Counter-Based Intrusion Detection System for DoS Attacks on Automotive CAN bus [45.24207460381396]
This paper presents a novel Intrusion Detection System (IDS) designed for the Controller Area Network (CAN) environment.<n>A RISC-V-based CAN receiver is simulated using the gem5 simulator, processing CAN frame payloads with AES-128 encryption as FreeRTOS tasks.<n>Results indicate that this approach could significantly improve CAN security and address emerging challenges in automotive cybersecurity.
arXiv Detail & Related papers (2025-07-19T20:09:52Z) - Autonomous AI-based Cybersecurity Framework for Critical Infrastructure: Real-Time Threat Mitigation [1.4999444543328293]
We propose a hybrid AI-driven cybersecurity framework to enhance real-time vulnerability detection, threat modelling, and automated remediation.<n>Our findings provide actionable insights to strengthen the security and resilience of critical infrastructure systems against emerging cyber threats.
arXiv Detail & Related papers (2025-07-10T04:17:29Z) - Enabling Security on the Edge: A CHERI Compartmentalized Network Stack [42.78181795494584]
CHERI provides strong security from the hardware level by enabling fine-grained compartmentalization and memory protection.<n>Our case study examines the trade-offs of isolating applications, TCP/IP libraries, and network drivers on a CheriBSD system deployed on the Arm Morello platform.
arXiv Detail & Related papers (2025-07-07T09:37:59Z) - CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment [45.86654759872101]
Cyber-physical systems (CPSs) have experienced a significant technological evolution and increased connectivity, at the cost of greater exposure to cyber-attacks.<n>We propose CyFence, a novel architecture that improves the resilience of closed-loop control systems against cyber-attacks by adding a semantic check.<n>We evaluate CyFence considering a real-world application, consisting of an active braking digital controller, demonstrating that it can mitigate different types of attacks with a negligible overhead.
arXiv Detail & Related papers (2025-06-12T12:22:45Z) - Llama-3.1-FoundationAI-SecurityLLM-Base-8B Technical Report [50.268821168513654]
We present Foundation-Sec-8B, a cybersecurity-focused large language model (LLMs) built on the Llama 3.1 architecture.
We evaluate it across both established and new cybersecurity benchmarks, showing that it matches Llama 3.1-70B and GPT-4o-mini in certain cybersecurity-specific tasks.
By releasing our model to the public, we aim to accelerate progress and adoption of AI-driven tools in both public and private cybersecurity contexts.
arXiv Detail & Related papers (2025-04-28T08:41:12Z) - Interactive cybersecurity training system based on simulation environments [0.0]
The article explores the possibilities of integrating simulation environments into the cybersecurity training process.
The article describes the implementation of various open source software tools based on the number of cyber threats.
arXiv Detail & Related papers (2024-12-30T23:45:10Z) - Simulation of Multi-Stage Attack and Defense Mechanisms in Smart Grids [2.0766068042442174]
We introduce a simulation environment that replicates the power grid's infrastructure and communication dynamics.
The framework generates diverse, realistic attack data to train machine learning algorithms for detecting and mitigating cyber threats.
It also provides a controlled, flexible platform to evaluate emerging security technologies, including advanced decision support systems.
arXiv Detail & Related papers (2024-12-09T07:07:17Z) - VMGuard: Reputation-Based Incentive Mechanism for Poisoning Attack Detection in Vehicular Metaverse [52.57251742991769]
vehicular Metaverse guard (VMGuard) protects vehicular Metaverse systems from data poisoning attacks.
VMGuard implements a reputation-based incentive mechanism to assess the trustworthiness of participating SIoT devices.
Our system ensures that reliable SIoT devices, previously missclassified, are not barred from participating in future rounds of the market.
arXiv Detail & Related papers (2024-12-05T17:08:20Z) - Network Simulation with Complex Cyber-attack Scenarios [0.0]
Network Intrusion Detection (NID) systems can benefit from Machine Learning (ML) models to detect complex cyber-attacks.
This paper presents a network simulation solution for the creation of NID datasets with complex attack scenarios.
arXiv Detail & Related papers (2024-12-02T12:00:53Z) - SDN-Based Smart Cyber Switching (SCS) for Cyber Restoration of a Digital Substation [0.4749981032986242]
This paper proposes a cybersecurity framework to bolster the resilience of substations based on the IEC-61850 standard.
The framework's effectiveness is validated through comprehensive simulations and a hardware-in-the-loop (HIL) testbed.
arXiv Detail & Related papers (2024-11-11T23:22:02Z) - Countering Autonomous Cyber Threats [40.00865970939829]
Foundation Models present dual-use concerns broadly and within the cyber domain specifically.
Recent research has shown the potential for these advanced models to inform or independently execute offensive cyberspace operations.
This work evaluates several state-of-the-art FMs on their ability to compromise machines in an isolated network and investigates defensive mechanisms to defeat such AI-powered attacks.
arXiv Detail & Related papers (2024-10-23T22:46:44Z) - Designing Robust Cyber-Defense Agents with Evolving Behavior Trees [0.0]
We develop an approach to design autonomous cyber defense agents using behavior trees with learning-enabled components.
Learning-enabled components are optimized for adapting to various cyber-attacks and deploying security mechanisms.
Our results demonstrate that the EBT-based agent is robust to adaptive cyber-attacks and provides high-level explanations for interpreting its decisions and actions.
arXiv Detail & Related papers (2024-10-21T18:00:38Z) - Performance Analysis of Decentralized Physical Infrastructure Networks and Centralized Clouds [42.37170902465878]
Decentralized Physical Infrastructure Networks (DePINs) aim to enhance data sovereignty and confidentiality and increase resilience against a single point of failure.
This work focuses on the potential of DePINs to disrupt traditional centralized architectures by taking advantage of the Internet of Things (IoT) devices and crypto-economic design in combination with blockchains.
arXiv Detail & Related papers (2024-04-12T08:00:38Z) - SISSA: Real-time Monitoring of Hardware Functional Safety and
Cybersecurity with In-vehicle SOME/IP Ethernet Traffic [49.549771439609046]
We propose SISSA, a SOME/IP communication traffic-based approach for modeling and analyzing in-vehicle functional safety and cyber security.
Specifically, SISSA models hardware failures with the Weibull distribution and addresses five potential attacks on SOME/IP communication.
Extensive experimental results show the effectiveness and efficiency of SISSA.
arXiv Detail & Related papers (2024-02-21T03:31:40Z) - The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective [64.36680481458868]
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge.
This paper provides a survey of security and privacy in MEC from the perspective of Artificial Intelligence (AI)
We focus on new security and privacy issues, as well as potential solutions from the viewpoints of AI.
arXiv Detail & Related papers (2024-01-03T07:47:22Z) - DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles [61.394095512765304]
Dynamic Wireless Power Transfer (DWPT) is a novel technology that allows charging an electric vehicle while driving.
Recent advancements in quantum computing jeopardize classical public key cryptography.
We propose DynamiQS, the first post-quantum secure authentication protocol for dynamic wireless charging.
arXiv Detail & Related papers (2023-12-20T09:40:45Z) - SCART: Simulation of Cyber Attacks for Real-Time [0.1633272850273525]
This paper introduces a novel cyber-attack simulation infrastructure designed to enhance simulation environments for real-time systems.<n>We present the SCART framework and dataset, addressing a central challenge in real-time systems: the lack of scalable testing environments.<n>By leveraging simulation-based capabilities, the framework generates training and testing data for data-driven approaches, such as machine learning.
arXiv Detail & Related papers (2023-04-07T14:25:30Z) - Defending against cybersecurity threats to the payments and banking
system [0.0]
The proliferation of cyber crimes is a huge concern for various stakeholders in the banking sector.
To prevent risks of cyber-attacks on software systems, entities operating within cyberspace must be identified.
This paper will examine various approaches that identify assets in cyberspace, classify the cyber threats, provide security defenses and map security measures to control types and functionalities.
arXiv Detail & Related papers (2022-12-15T11:55:11Z) - Simulating Malicious Attacks on VANETs for Connected and Autonomous
Vehicle Cybersecurity: A Machine Learning Dataset [0.4129225533930965]
Connected and Autonomous Vehicles (CAVs) rely on Vehicular Adhoc Networks with wireless communication between vehicles and roadside infrastructure to support safe operation.
cybersecurity attacks pose a threat to VANETs and the safe operation of CAVs.
This study proposes the use of simulation for modelling typical communication scenarios which may be subject to malicious attacks.
arXiv Detail & Related papers (2022-02-15T20:08:58Z) - A next-generation platform for Cyber Range-as-a-Service [0.0]
We highlight the novel features for the next-generation Cyber Range platforms.
These features include the creation of a virtual clone for an actual corporate infrastructure, relieving the security managers from the setup of the training scenarios and sessions.
arXiv Detail & Related papers (2021-12-21T13:51:53Z) - A Framework for Evaluating the Cybersecurity Risk of Real World, Machine
Learning Production Systems [41.470634460215564]
We develop an extension to the MulVAL attack graph generation and analysis framework to incorporate cyberattacks on ML production systems.
Using the proposed extension, security practitioners can apply attack graph analysis methods in environments that include ML components.
arXiv Detail & Related papers (2021-07-05T05:58:11Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.