Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс: https://dspace.ncfu.ru/handle/20.500.12258/25244
Полная запись метаданных
Поле DCЗначениеЯзык
dc.contributor.authorLapina, M. A.-
dc.contributor.authorЛапина, М. А.-
dc.date.accessioned2023-09-08T08:05:37Z-
dc.date.available2023-09-08T08:05:37Z-
dc.date.issued2023-
dc.identifier.citationBasan, E., Lapina, M., Lesnikov, A., Basyuk, A., Mogilny, A. Trust Monitoring in a Cyber-Physical System for Security Analysis Based on Distributed Computing // Lecture Notes in Networks and Systems. - 2023. - 702 LNNS, pp. 430-440. - DOI: 10.1007/978-3-031-34127-4_42ru
dc.identifier.urihttp://hdl.handle.net/20.500.12258/25244-
dc.description.abstractCyber-physical systems are widely used. Nevertheless, security issues are quite acute for them. First of all, because the system must work constantly without downtime and failures. The Cyber-Physical System (CPS) must quickly transfer the parameters to the monitoring system, but if the system is not flexible enough, fast and optimal, then collisions and additional loads on the CPS may occur. This study proposes a system for monitoring and detecting anomalies for CPS based on the principles of trust, which allows you to verify the correctness of the system and detect possible anomalies. In our study, we focus on traffic analysis and analysis of the CPU operation, since these parameters are the most critical in the operation of the CPS itself. The technique is based on computationally simple algorithms and allows to analyze the basic parameters that are typical for most CPS. These factors make it highly scalable and applicable to various types of CPS, despite the fragmentation and a large number of architectures. A distributed application architecture was developed for monitoring and analyzing trust in the CPS. The calculation results show the possibility of detecting the consequences of the influences of denial-of-service attacks or CPS. In this case, three basic parameters are sufficient for detection. Thus, one of the features of the system is reflexivity in detecting anomalies, that is, we force devices to independently analyze their behavior and make a decision about the presence of anomalies.ru
dc.language.isoenru
dc.relation.ispartofseriesLecture Notes in Networks and Systems-
dc.subjectAnomaly detectionru
dc.subjectReflectionru
dc.subjectAttacksru
dc.subjectDenial of serviceru
dc.subjectMonitoringru
dc.subjectTrustru
dc.titleTrust Monitoring in a Cyber-Physical System for Security Analysis Based on Distributed Computingru
dc.typeСтатьяru
vkr.instИнститут цифрового развитияru
Располагается в коллекциях:Статьи, проиндексированные в SCOPUS, WOS

Файлы этого ресурса:
Файл РазмерФормат 
scopusresults 2711 .pdf
  Доступ ограничен
131.51 kBAdobe PDFПросмотреть/Открыть


Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.