Sridhar Adepu

ORCID: 0000-0002-0045-2811
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Information and Cyber Security
  • Anomaly Detection Techniques and Applications
  • Security and Verification in Computing
  • Fault Detection and Control Systems
  • Safety Systems Engineering in Autonomy
  • Cryptographic Implementations and Security
  • Advanced Software Engineering Methodologies
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Software Testing and Debugging Techniques
  • Real-time simulation and control systems
  • Cryptography and Data Security
  • Simulation Techniques and Applications
  • Software Engineering Research
  • Adversarial Robustness in Machine Learning
  • Software Reliability and Analysis Research
  • Blockchain Technology Applications and Security
  • User Authentication and Security Systems
  • Advanced Authentication Protocols Security
  • Electric Vehicles and Infrastructure
  • Cloud Data Security Solutions
  • Water Systems and Optimization
  • Access Control and Trust

University of Bristol
2021-2025

Singapore University of Technology and Design
2015-2021

University of Padua
2019

Tsinghua University
2019

Deutsches Historisches Institut Rom
2019

National Institute of Technology Rourkela
2013

This paper presents a novel unsupervised approach to detect cyber attacks in Cyber-Physical Systems (CPS). We describe an learning using Recurrent Neural network which is time series predictor as our model. then use the Cumulative Sum method identify anomalies replicate of water treatment plant. The proposed not only detects CPS but also identifies sensor that was attacked. experiments were performed on complex dataset collected through Secure Water Treatment Testbed (SWaT). Through...

10.1109/hase.2017.36 article EN 2017-01-01

The rise in attempted and successful attacks on critical infrastructure, such as power grid water treatment plants, has led to an urgent need for the creation adoption of methods detecting often launched either by insiders or state actors. This paper focuses one method that aims at detection compromise more actuators sensors a plant through intrusion plant's communication network directly computers. method, labelled Distributed Attack Detection (DAD), detects real-time identifying anomalies...

10.1109/tdsc.2018.2875008 article EN IEEE Transactions on Dependable and Secure Computing 2018-10-09

With the widespread innovation of Internet Things, software-defined networking (SDN), and cloud computing, cyber-physical systems (CPSs) have been developed widely adopted to facilitate our daily life economy. In particular, modern society heavily relies on all kinds CPSs, such as smart grids, transportation systems. So shutdown critical services can lead serious consequences. Meanwhile, distributed denial-of-service (DDoS) attacks are becoming a major threat CPSs due their ease execution...

10.1109/tii.2023.3240586 article EN IEEE Transactions on Industrial Informatics 2023-01-30

A distributed detection method is proposed to detect single stage multi-point (SSMP) attacks on a Cyber Physical System (CPS). Such aim at compromising two or more sensors actuators any one of CPS and could totally compromise controller prevent it from detecting the attack. However, as demonstrated in this work, using flow properties water other, neighboring was found effective such attacks. The based physical invariants derived for each its design. attack effectiveness evaluated...

10.1145/2897845.2897855 article EN 2016-05-27

An experimental investigation was undertaken to understand the impact of single-point cyber attacks on a Secure Water Treatment (SWaT) system. Cyber were launched SWaT through its SCADA server that connects Programmable Logic Controllers (PLCs) in turn are connected sensors and actuators. Attacks designed meet attacker objectives selected from novel model. Outcome experiments led better understanding (a) propagation an attack across system measured terms number components affected (b)...

10.1109/hase.2016.14 article EN 2016-01-01

An attacker model is proposed for Cyber Physical Systems (CPS). The attack models derived from the are used to generate parameterized procedures and functions that target a specific CPS. capture both physical cyber attacks unify number of existing into common framework useful researchers in experimental assessment detection techniques. generality shown by mapping broad variety here, as well generating not found CPS design literature. have been extensively understanding impact on water...

10.1109/compsac.2016.122 article EN 2016-06-01

An approach to analyzing the security of a cyber-physical system (CPS) is proposed, where behavior physical plant and its controller are captured in approximate models, their interaction rigorously checked discover potential attacks that involve varying number compromised sensors actuators. As preliminary study, this has been applied fully functional water treatment testbed constructed at Singapore University Technology Design. The analysis revealed previously unknown were confirmed pose...

10.1145/2897035.2897041 article EN 2016-05-14

Our work considers the challenges related to education and research about security of industrial control systems (ICS). We propose address those through gamified competitions. Those competitions should target a broad range professionals (e. g., from academia industry). Furthermore, they involve both attack defense components. This could include development new techniques evaluation novel countermeasures. gamification idea resulted in design implementation SWaT Security Showdown (S3). S3 is...

10.1145/3140241.3140253 article EN 2017-10-31

A hackfest named SWaT Security Showdown (S <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">3</sup> ) has been organized consecutively for two years. S enabled researchers and practitioners to assess the effectiveness of methods products aimed at detecting cyber attacks launched in real-time on an operational water treatment plant, namely, Secure Water Treatment (SWaT). In , independent attack teams design launch while defence protect plant...

10.1109/tsusc.2018.2878597 article EN IEEE Transactions on Sustainable Computing 2018-10-30

An experiment was conducted on a water treatment plant to investigate the effectiveness of using Kalman filter based attack detection schemes in Cyber Physical System (CPS). implemented with Chi-Square detector. Random, stealthy bias, and replay attacks were launched results analysed. Analysis indicates that false data injection cannot be detected by legacy failure methods.

10.1109/scspw.2016.7509557 article EN 2016-04-01

Many self-adaptive systems benefit from human involvement and oversight, where a operator can provide expertise not available to the system detect problems that is unaware of. One way of achieving this by placing on loop - i.e., providing supervisory oversight intervening in case questionable adaptation decisions. To make such interaction effective, explanation sometimes helpful allow understand why making certain decisions calibrate confidence perspective. However, explanations come with...

10.1145/3387939.3391592 article EN 2020-06-29

Abstract Modern critical infrastructure, such as a water treatment plant, distribution system, and power grid, are representative of Cyber Physical Systems (CPSs) in which the physical processes monitored controlled real time. One source complexity systems is due to intra-system interactions inter-dependencies. Consequently, these potential target for attackers. When one or more infrastructure attacked, connected may also be affected cascading effects. In this paper, we report study...

10.1186/s42400-021-00071-z article EN cc-by Cybersecurity 2021-03-01

Cyber-physical control systems, such as industrial systems (ICS), are increasingly targeted by cyberattacks. Such attacks can potentially cause tremendous damage, affect critical infrastructure or even jeopardize human life when the system does not behave intended. Cyberattacks, however, new and decades of security research have developed plenty solutions to thwart them. Unfortunately, many these cannot be easily applied safety-critical cyber-physical systems. Further, attack surface ICS is...

10.1109/iccps48487.2020.00011 article EN 2020-04-01

Security attacks present unique challenges to the design of self-adaptation mechanism for software-intensive systems due adversarial nature environment. Game-theoretical approaches have been explored in security model malicious behaviors and reliable defense system a mathematically grounded manner. However, modeling as single player, done prior works, is insufficient under partial compromise fine-grained defensive policies where rest with autonomy can cooperate mitigate impact attacks. To...

10.1145/3652949 article EN ACM Transactions on Autonomous and Adaptive Systems 2024-03-22

Argus, a framework for defending public utility against cyber-physical attacks, contains intelligent checkers that use invariants derived from the physical and chemical interactions among various components products of utility. An Argus implementation is independent traditional layered defense employs firewalls other network-based logic to prevent intrusions into control systems, hence referred as orthogonal defense. Portions have been implemented tested in an operational water treatment...

10.1109/mic.2016.104 article EN IEEE Internet Computing 2016-09-01

An approach is proposed to derive state-based invariants that, when programmed into a controller, proved be effective in detecting cyber attacks on an Industrial Control System (ICS). The begins with the ICS design and models its process dynamics using extended hybrid automata from which are derived. Each invariant inserted appropriate Programmable Logic Controller (PLC) as companion control code. active during operation serves check validity of system state accordance design. This approach,...

10.1109/qrs-c.2017.91 article EN 2017-07-01
Coming Soon ...