all InfoSec news
Temporal assessment of malicious behaviors: application to turnout field data monitoring
May 7, 2024, 4:11 a.m. | Sara Abdellaoui, Emil Dumitrescu, C\'edric Escudero, Eric Zama\"i
cs.CR updates on arXiv.org arxiv.org
Abstract: Monitored data collected from railway turnouts are vulnerable to cyberattacks: attackers may either conceal failures or trigger unnecessary maintenance actions. To address this issue, a cyberattack investigation method is proposed based on predictions made from the temporal evolution of the turnout behavior. These predictions are then compared to the field acquired data to detect any discrepancy. This method is illustrated on a collection of real-life data.
actions address application arxiv assessment attackers conceal cs.cr cs.lg cs.sy cyberattack cyberattacks data eess.sy evolution failures investigation issue maintenance malicious may monitoring predictions railway temporal trigger vulnerable
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Senior - Penetration Tester
@ Deloitte | Madrid, España
Associate Cyber Incident Responder
@ Highmark Health | PA, Working at Home - Pennsylvania
Senior Insider Threat Analyst
@ IT Concepts Inc. | Woodlawn, Maryland, United States