add reference to articles
This commit is contained in:
parent
d24aa59706
commit
2ea0650c00
2 changed files with 24 additions and 1 deletions
|
|
@ -22,7 +22,6 @@ For these reasons, network switches are prime candidates for side-channel securi
|
|||
The installation of a side-channel monitoring system is often minimally invasive and can even be performed without downtime if the machine supports redundant power supplies.
|
||||
The aim of the project was to leverage side-channel analysis to detect anomalous activities that can be related to attacks on a network switch.
|
||||
The goal is not to create a complete \gls{ids} suite from physics-based security but to offer a complementary detection mechanism for the cases where traditional \gls{ids} are failing.
|
||||
\agd{ask sebastian about examples of traditional H|N-IDS}
|
||||
|
||||
|
||||
\subsection{Attack Scenario}
|
||||
|
|
@ -106,6 +105,8 @@ All these methods yield good results for the detection of abnormal firmware.
|
|||
\label{fig:eet1_firmware}
|
||||
\end{figure}
|
||||
|
||||
This first exploration of the capabilities of physics-based \gls{ids} lead to the publication of an article \cite{eet1_mlcs} at the workshop on Machine Learning for Cyber Security at the ECML-PKDD conference.
|
||||
|
||||
\newpage
|
||||
\section{xPSU}\label{sec:xpsu}
|
||||
The xPSU project continued the exploratory work started with the \gls{eet} project.
|
||||
|
|
@ -192,6 +193,7 @@ We performed the second evaluation on a drone.
|
|||
A drone is a prime machine for the \gls{bpv} as its low complexity allows for consistent boot traces.
|
||||
We successfully detected different firmware versions by leveraging the information from the two previous experiments.
|
||||
Along the evaluations, the \gls{bpv} capabilities have been modified to adapt to specific cases and enable anomalous training samples, multi-model evaluations, and autonomous learning.
|
||||
This expansion of the work on \gls{bpv} lead to the plublication of a paper \cite{bpv_qrs} at the QRS Conference.
|
||||
|
||||
\begin{table}[ht]
|
||||
\centering
|
||||
|
|
@ -375,6 +377,7 @@ The normalized state edit distance is defined as
|
|||
with $Lev$ the Levenshtein distance.
|
||||
This metric is complementary to the accuracy and will be computed for every evaluation of the the state detection algorithms.
|
||||
|
||||
This work on the detection of machine activity from power consumption information lead to the publication of an article \cite{dsd_qrs} at the QRS conference.
|
||||
\newpage
|
||||
\section{Conclusion on Past Work}
|
||||
The project of physics-based security at a global level with complete independence from the protected machine is not trivial.
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue