acm-header
Sign In

Communications of the ACM

ACM TechNews

New Technology Advances Protection of Critical Systems From Insider-Assisted Attacks


View as: Print Mobile App Share:
A cyber attacker at work.

A team of researchers at Purdue University has developed a new covert defense algorithm that employs evasive tactics to deceive attackers.

Credit: Purdue University

Purdue University researchers have developed a covert defense algorithm that employs evasive tactics to deceive cyberattackers targeting critical systems from within.

The concept is to modify all signals channeled through the network, from and to the sensors and facility components, by small amounts without affecting system performance or the ability to detect intrusions.

Hackers cannot see their target because the covert signals masquerade as noise normally expected in system traffic.

Operators also can make these signals almost impossible to detect by continuously changing them.

The team says this method has applications for numerous industrial control systems that use computers to continuously monitor operations and dispatch commands to maintain safe and economical system operations, including nuclear power plants, refineries, autonomous vehicles, drones, and Internet of Things devices.

From Purdue University News
View Full Article

 

Abstracts Copyright © 2018 Information Inc., Bethesda, Maryland, USA


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account