PDF] Power Consumption-based Detection of Sabotage Attacks in
Por um escritor misterioso
Last updated 29 maio 2024
This work proposes a novel approach for detecting sabotage attacks in additive Manufacturing, based on continuous monitoring of the current delivered to all actuators during the manufacturing process and detection of deviations from a provable benign process. Additive Manufacturing (AM), a.k.a. 3D Printing, is increasingly used to manufacture functional parts of safety-critical systems. AM's dependence on computerization raises the concern that the AM process can be tampered with, and a part's mechanical properties sabotaged. This can lead to the destruction of a system employing the sabotaged part, causing loss of life, financial damage, and reputation loss. To address this threat, we propose a novel approach for detecting sabotage attacks. Our approach is based on continuous monitoring of the current delivered to all actuators during the manufacturing process and detection of deviations from a provable benign process. The proposed approach has numerous advantages: (i) it is non-invasive in a time-critical process, (ii) it can be retrofitted in legacy systems, and (iii) it is airgapped from the computerized components of the AM process, preventing simultaneous compromise. Evaluation on a desktop 3D Printer detects all attacks involving a modification of X or Y motor movement, with false positives at 0%.
What is Cyber Warfare, Types, Examples & Mitigation
Survey of intrusion detection systems: techniques, datasets and challenges, Cybersecurity
A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)
Russian Offensive Campaign Assessment, July 20, 2023
Frontiers Using Design Thinking to Understand Cyber Attack Surfaces of Future Smart Grids
PDF) Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors
An energy-aware and Q-learning-based area coverage for oil pipeline monitoring systems using sensors and Internet of Things
JCP, Free Full-Text
PDF] Power Consumption-based Detection of Sabotage Attacks in Additive Manufacturing
Enterprise data breach: causes, challenges, prevention, and future directions - Cheng - 2017 - WIREs Data Mining and Knowledge Discovery - Wiley Online Library
Recomendado para você
-
New Cura [4.2.1]: Extruder start g-code executed on start · Issue29 maio 2024
-
Project4_G-Code : 5 Steps - Instructables29 maio 2024
-
G-code is the language used by computers to communicate with 3D29 maio 2024
-
Cura 2.4 and Post Processing Scripts? - UltiMaker Cura - UltiMaker29 maio 2024
-
Resuming a Print (After Turning Off and Moving the Machine)29 maio 2024
-
Bridge infill HUGE overextrusion. – PrusaSlicer – Prusa3D Forum29 maio 2024
-
Recently switched to Prusa Slicer for better supports and wanted29 maio 2024
-
Tool Path Modification for 3D Printing: 3. Code – Learn As If You29 maio 2024
-
Weird Circle In G-Code - Bambu Lab Software - Bambu Lab Community29 maio 2024
-
G1 - BMW nacionaliza a R 1200 GS e preço baixa para R$ 69.900 - notícias em Motos29 maio 2024
você pode gostar
-
The Blind Movie - I Am Second29 maio 2024
-
Steam Workshop::Search Players For Weapons29 maio 2024
-
Ilustração dos desenhos animados do grupo de personagens de animais em quadrinhos de gatos coloridos engraçados29 maio 2024
-
Quotes about Lessons from the past (32 quotes)29 maio 2024
-
Significado do nome CAMILLE - DICIONÁRIO DOS NOMES29 maio 2024
-
SHALLTEAR QUER MATA A PU** VEIA! 🇧🇷 (Overlord dublado)29 maio 2024
-
962 clarendon ave columbus oh 4322329 maio 2024
-
Roblox Rainbow Friends Plush Toy Rainbow Partner Small Blue Man Stuffed Animal Doll For Children Gift29 maio 2024
-
kirijou mitsuru and artemisia (persona and 2 more) drawn by c-brown29 maio 2024
-
The Black List 2021 Screenplays List — Hollywood's Best29 maio 2024