Chuadhry Mujeeb Ahmed

ORCID: 0000-0003-3644-0465
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Anomaly Detection Techniques and Applications
  • Electrostatic Discharge in Electronics
  • Information and Cyber Security
  • Internet Traffic Analysis and Secure E-voting
  • Blockchain Technology Applications and Security
  • Advanced MIMO Systems Optimization
  • Advanced Wireless Network Optimization
  • IoT and Edge/Fog Computing
  • Cooperative Communication and Network Coding
  • Adversarial Robustness in Machine Learning
  • Privacy-Preserving Technologies in Data
  • User Authentication and Security Systems
  • Digital Media Forensic Detection
  • Cryptographic Implementations and Security
  • Water Systems and Optimization
  • Maritime Navigation and Safety
  • Ferroelectric and Negative Capacitance Devices
  • Privacy, Security, and Data Protection
  • Industrial Vision Systems and Defect Detection
  • Mobile Crowdsensing and Crowdsourcing
  • Cryptography and Data Security

Newcastle University
2023-2025

Jamia Millia Islamia
2024

University of Strathclyde
2021-2023

Singapore University of Technology and Design
2015-2021

University Ucinf
2021

Delft University of Technology
2020

HITEC University
2014

Seoul National University
2013

The architecture of a water distribution testbed (WADI), and on-going research in the design secure system is presented. WADI consists three stages controlled by Programmable Logic Controllers (PLCs) two via Remote Terminal Units (RTUs). Each PLC RTU uses sensors to estimate state actuators effect control. currently used (a) conduct security analysis for networks, (b) experimentally assess detection mechanisms potential cyber physical attacks, (c) understand how impact an attack on one CPS...

10.1145/3055366.3055375 article EN 2017-04-06

A novel scheme is proposed to authenticate sensors and detect data integrity attacks in a Cyber Physical System (CPS). The technique uses the hardware characteristics of sensor physics process create unique patterns (herein termed as fingerprints) for each sensor. fingerprint function noise embedded measurements. Uniqueness appears due manufacturing imperfections features physical process. To sensor's system-model based approach used. noise-based created during normal operation system. It...

10.1145/3274694.3274748 article EN 2018-12-03

In this manuscript, we present a detailed case study about model-based attack detection procedures for Cyber-Physical Systems (CPSs). particular, using EPANET (a simulation tool water distribution systems), simulate Water Distribution Network (WDN). Using data and sub-space identification techniques, an input-output Linear Time Invariant (LTI) model the network is obtained. This used to derive Kalman filter estimate evolution of system dynamics. Then, residual variables are constructed by...

10.1145/3052973.3053011 article EN Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security 2017-03-31

An attack detection scheme is proposed to detect data integrity attacks on sensors in Cyber-Physical Systems (CPSs). A combined fingerprint for sensor and process noise created during the normal operation of system. Under spoofing attack, pattern deviates from fingerprinted enabling attacks. To extract (difference between expected observed value) a representative model system derived. Kalman filter used purpose state estimation. By subtracting estimates real states, residual vector obtained....

10.1145/3196494.3196532 article EN 2018-05-29

Data-centric approaches are becoming increasingly common in the creation of defense mechanisms for critical infrastructure such as electric power grid and water treatment plants. Such often use well-known methods from machine learning system identification, i.e., Multi-Layer Perceptron, Convolutional Neural Network, Deep Auto Encoders to create process anomaly detectors. detectors then evaluated using data generated an operational plant or a simulator; rarely is assessment conducted real...

10.1145/3384941.3409588 article EN 2020-10-06

Abstract Gradual increase in the number of successful attacks against Industrial Control Systems (ICS) has led to an urgent need create defense mechanisms for accurate and timely detection resulting process anomalies. Towards this end, a class anomaly detectors, created using data-centric approaches, are gaining attention. Using machine learning algorithms such approaches can automatically learn dynamics control strategies deployed ICS. The use these leads relatively easier faster creation...

10.1186/s42400-021-00095-5 article EN cc-by Cybersecurity 2021-08-01

An experiment was conducted on a water treatment plant to investigate the effectiveness of using Kalman filter based attack detection schemes in Cyber Physical System (CPS). implemented with Chi-Square detector. Random, stealthy bias, and replay attacks were launched results analysed. Analysis indicates that false data injection cannot be detected by legacy failure methods.

10.1109/scspw.2016.7509557 article EN 2016-04-01

Cyberphysical systems (CPSs) are part of the critical infrastructure. CPS security is challenging because system can be attacked from both cyber and physical domains. In this article, a comprehensive study taken to summarize challenges proposed solutions for securing physics-based perspective.

10.1109/msec.2020.3002851 article EN IEEE Security & Privacy 2020-07-21

Massive volumes of malware spread incidents continue to occur frequently across the Internet Things (IoT). Owing its self-learning and adaptive capability, artificial intelligence (AI) can provide assistance for automatically converging an optimal strategy. By merging AI into edge computing, we consider intelligence-enabled IoT (EIIoT) environment a stochastic learning strategy suppressing malware. In particular, introduce game theory symbolise whole process confrontation between nodes....

10.1109/jiot.2024.3381281 article EN IEEE Internet of Things Journal 2024-03-25

Fingerprinting of various physical and logical devices has been proposed for uniquely identifying users or mainstream IT systems such as PCs, laptops, smart phones. However, the application techniques in Industrial Control Systems (ICS) is less explored reasons a lack direct access to cost faithfully reproducing realistic threat scenarios. This work addresses feasibility using fingerprinting context ICS related water treatment distribution systems. A model-free sensor scheme ( NoiSense )...

10.1145/3410447 article EN ACM Transactions on Privacy and Security 2020-09-28

A lot of research in security cyber physical systems focus on threat models where an attacker can spoof sensor readings by compromising the communication channel. little is given to attacks components. In this paper a method detect potential components Cyber Physical System (CPS) proposed. are detected through comparison noise pattern from measurements reference pattern. If adversary has physically modified or replaced sensor, proposed issues alert indicating that probably compromised...

10.1109/qrs-c.2017.89 article EN 2017-07-01

To ensure the proper functioning of critical systems, it is important to design secure Cyber Physical Systems (CPS). Since CPS are connected most studies consider external adversaries as a threat model, which might not be able cater for an insider with physical access system. In this article, we proposed attack detection mechanism who has CPS. The method exploits dynamics system and detects based on laws Physics. Based mass flow equations, analyze rate change in plant's process create...

10.1145/3196494.3201587 article EN 2018-05-29

Adversarial learning is used to test the robustness of machine algorithms under attack and create attacks that deceive anomaly detection methods in Industrial Control System (ICS). Given security assessment an ICS demands exhaustive set possible patterns studied, this work, we propose association rule mining-based generation technique. The technique has been implemented using data from a Secure Water Treatment plant. proposed was able generate more than 110,000 constituting vast majority new...

10.1145/3462633.3483976 article EN 2021-11-13

Critical infrastructures across many industries, such as smart water treatment and distribution networks (SWTDNs) power generation public transport networks, depend on the supervisory control data acquisition (SCADA) system. However, being core component of critical infrastructures, it has made SCADA-based SWTDN system an attractive target for cyberattacks. A successful attack SCADA will have a devastating impact in terms proper operations; therefore, safeguarding from cyberattacks is...

10.1109/jiot.2021.3100461 article EN IEEE Internet of Things Journal 2021-07-27
Coming Soon ...