TY - GEN
T1 - Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming
AU - Canepa, Edward S.
AU - Claudel, Christian G.
N1 - KAUST Repository Item: Exported on 2020-10-01
PY - 2013/1
Y1 - 2013/1
N2 - Traffic sensing systems rely more and more on user generated (insecure) data, which can pose a security risk whenever the data is used for traffic flow control. In this article, we propose a new formulation for detecting malicious data injection in traffic flow monitoring systems by using the underlying traffic flow model. The state of traffic is modeled by the Lighthill-Whitham- Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for some decision variable. We use this fact to pose the problem of detecting spoofing cyber-attacks in probe-based traffic flow information systems as mixed integer linear feasibility problem. The resulting framework can be used to detect spoofing attacks in real time, or to evaluate the worst-case effects of an attack offline. A numerical implementation is performed on a cyber-attack scenario involving experimental data from the Mobile Century experiment and the Mobile Millennium system currently operational in Northern California. © 2013 IEEE.
AB - Traffic sensing systems rely more and more on user generated (insecure) data, which can pose a security risk whenever the data is used for traffic flow control. In this article, we propose a new formulation for detecting malicious data injection in traffic flow monitoring systems by using the underlying traffic flow model. The state of traffic is modeled by the Lighthill-Whitham- Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for some decision variable. We use this fact to pose the problem of detecting spoofing cyber-attacks in probe-based traffic flow information systems as mixed integer linear feasibility problem. The resulting framework can be used to detect spoofing attacks in real time, or to evaluate the worst-case effects of an attack offline. A numerical implementation is performed on a cyber-attack scenario involving experimental data from the Mobile Century experiment and the Mobile Millennium system currently operational in Northern California. © 2013 IEEE.
UR - http://hdl.handle.net/10754/564677
UR - http://ieeexplore.ieee.org/document/6504104/
UR - http://www.scopus.com/inward/record.url?scp=84877604799&partnerID=8YFLogxK
U2 - 10.1109/ICCNC.2013.6504104
DO - 10.1109/ICCNC.2013.6504104
M3 - Conference contribution
SN - 9781467352888
SP - 327
EP - 333
BT - 2013 International Conference on Computing, Networking and Communications (ICNC)
PB - Institute of Electrical and Electronics Engineers (IEEE)
ER -