skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor

Abstract

Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL provides a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.

Authors:
; ; ;
Publication Date:
Research Org.:
Idaho National Laboratory (INL)
Sponsoring Org.:
DOE - OE
OSTI Identifier:
1028233
Report Number(s):
INL/CON-11-21923
TRN: US201122%%757
DOE Contract Number:  
DE-AC07-05ID14517
Resource Type:
Conference
Resource Relation:
Conference: 4th International Symposium on Resilient Control Systems,Boise, Idaho,08/09/2011,08/11/2011
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICAL METHODS AND COMPUTING; ALGORITHMS; CONTROL SYSTEMS; DETECTION; FUZZY LOGIC; PERFORMANCE; SECURITY; SENSORS; SIMULATION; Anomaly Detection; Cyber Sensor; Embedded Systems; Online Clustering; Type-2 Fuzzy Logic

Citation Formats

Linda, Ondrej, Vollmer, Todd, Alves-Foss, Jim, and Manic, Milos. Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor. United States: N. p., 2011. Web.
Linda, Ondrej, Vollmer, Todd, Alves-Foss, Jim, & Manic, Milos. Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor. United States.
Linda, Ondrej, Vollmer, Todd, Alves-Foss, Jim, and Manic, Milos. Mon . "Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor". United States. https://www.osti.gov/servlets/purl/1028233.
@article{osti_1028233,
title = {Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor},
author = {Linda, Ondrej and Vollmer, Todd and Alves-Foss, Jim and Manic, Milos},
abstractNote = {Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL provides a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.},
doi = {},
url = {https://www.osti.gov/biblio/1028233}, journal = {},
number = ,
volume = ,
place = {United States},
year = {2011},
month = {8}
}

Conference:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share: