首页> 外文会议>2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference >Malicious Code Detection on Smart Meters -A Side-Channel Based Approach
【24h】

Malicious Code Detection on Smart Meters -A Side-Channel Based Approach

机译:智能电表的恶意代码检测-一种基于边信道的方法

获取原文
获取原文并翻译 | 示例

摘要

With the continuous development of smart grids, smart meter, one of the typical embedded equipment, is also becoming more intellectualized. Smart meters nowadays are capable of not only recording power consumption, but also uploading information to the electricity supplier for monitoring and billing, which makes the electric power dispatching and usage more efficient and convenient. However, the enhanced functions and computation power of the smart meter renders it more valuable and vulnerable for the adversary to conduct a cyber attack. One of the most common and important security threats of the smart meter is the malicious code due to its widespread and the easy access for adversaries. Therefore, it is of great criticalness to detect malicious code in the smart meters to safeguard the security of smart terminals. In this paper, we propose a novel approach that detects malicious code in embedded terminals, e.g., smart meters, with a Long Short Term Memory (LSTM) network based on the power consumption of the CPU or MCU of the device. The evaluation results demonstrate that the proposed method can effectively detect the malicious code in smart meters with an accuracy as high as 92%.
机译:随着智能电网的不断发展,作为典型嵌入式设备之一的智能电表也越来越智能化。如今的智能电表不仅可以记录功耗,还可以将信息上载到电力供应商以进行监控和计费,这使得电力分配和使用更加高效便捷。但是,智能电表的增强功能和计算能力使其对于对手进行网络攻击更加有价值和脆弱。智能电表最常见,最重要的安全威胁之一就是恶意代码,原因是它的分布广泛且易于攻击者访问。因此,检测智能电表中的恶意代码对维护智能终端的安全性至关重要。在本文中,我们提出了一种新颖的方法,该方法可以根据设备的CPU或MCU的功耗,使用长短期内存(LSTM)网络在嵌入式终端(例如智能电表)中检测恶意代码。评估结果表明,该方法可以有效检测智能电表中的恶意代码,准确率高达92%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号