Cargando…

Detection of Potentially Compromised Computer Nodes and Clusters Connected on a Smart Grid, Using Power Consumption Data

Monitoring what application or type of applications running on a computer or a cluster without violating the privacy of the users can be challenging, especially when we may not have operator access to these devices, or specialized software. Smart grids and Internet of things (IoT) devices can provid...

Descripción completa

Detalles Bibliográficos
Autores principales: Almshari, Mohammed, Tsaramirsis, Georgios, Khadidos, Adil Omar, Buhari, Seyed Mohammed, Khan, Fazal Qudus, Khadidos, Alaa Omar
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7570659/
https://www.ncbi.nlm.nih.gov/pubmed/32906665
http://dx.doi.org/10.3390/s20185075
_version_ 1783596998065127424
author Almshari, Mohammed
Tsaramirsis, Georgios
Khadidos, Adil Omar
Buhari, Seyed Mohammed
Khan, Fazal Qudus
Khadidos, Alaa Omar
author_facet Almshari, Mohammed
Tsaramirsis, Georgios
Khadidos, Adil Omar
Buhari, Seyed Mohammed
Khan, Fazal Qudus
Khadidos, Alaa Omar
author_sort Almshari, Mohammed
collection PubMed
description Monitoring what application or type of applications running on a computer or a cluster without violating the privacy of the users can be challenging, especially when we may not have operator access to these devices, or specialized software. Smart grids and Internet of things (IoT) devices can provide power consumption data of connected individual devices or groups. This research will attempt to provide insides on what applications are running based on the power consumption of the machines and clusters. It is therefore assumed that there is a correlation between electric power and what software application is running. Additionally, it is believed that it is possible to create power consumption profiles for various software applications and even normal and abnormal behavior (e.g., a virus). In order to achieve this, an experiment was organized for the purpose of collecting 48 h of continuous real power consumption data from two PCs that were part of a university computer lab. That included collecting data with a one-second sample period, during class as well as idle time from each machine and their cluster. During the second half of the recording period, one of the machines was infected with a custom-made virus, allowing comparison between power consumption data before and after infection. The data were analyzed using different approaches: descriptive analysis, F-Test of two samples of variance, two-way analysis of variance (ANOVA) and autoregressive integrated moving average (ARIMA). The results show that it is possible to detect what type of application is running and if an individual machine or its cluster are infected. Additionally, we can conclude if the lab is used or not, making this research an ideal management tool for administrators.
format Online
Article
Text
id pubmed-7570659
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75706592020-10-28 Detection of Potentially Compromised Computer Nodes and Clusters Connected on a Smart Grid, Using Power Consumption Data Almshari, Mohammed Tsaramirsis, Georgios Khadidos, Adil Omar Buhari, Seyed Mohammed Khan, Fazal Qudus Khadidos, Alaa Omar Sensors (Basel) Article Monitoring what application or type of applications running on a computer or a cluster without violating the privacy of the users can be challenging, especially when we may not have operator access to these devices, or specialized software. Smart grids and Internet of things (IoT) devices can provide power consumption data of connected individual devices or groups. This research will attempt to provide insides on what applications are running based on the power consumption of the machines and clusters. It is therefore assumed that there is a correlation between electric power and what software application is running. Additionally, it is believed that it is possible to create power consumption profiles for various software applications and even normal and abnormal behavior (e.g., a virus). In order to achieve this, an experiment was organized for the purpose of collecting 48 h of continuous real power consumption data from two PCs that were part of a university computer lab. That included collecting data with a one-second sample period, during class as well as idle time from each machine and their cluster. During the second half of the recording period, one of the machines was infected with a custom-made virus, allowing comparison between power consumption data before and after infection. The data were analyzed using different approaches: descriptive analysis, F-Test of two samples of variance, two-way analysis of variance (ANOVA) and autoregressive integrated moving average (ARIMA). The results show that it is possible to detect what type of application is running and if an individual machine or its cluster are infected. Additionally, we can conclude if the lab is used or not, making this research an ideal management tool for administrators. MDPI 2020-09-07 /pmc/articles/PMC7570659/ /pubmed/32906665 http://dx.doi.org/10.3390/s20185075 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Almshari, Mohammed
Tsaramirsis, Georgios
Khadidos, Adil Omar
Buhari, Seyed Mohammed
Khan, Fazal Qudus
Khadidos, Alaa Omar
Detection of Potentially Compromised Computer Nodes and Clusters Connected on a Smart Grid, Using Power Consumption Data
title Detection of Potentially Compromised Computer Nodes and Clusters Connected on a Smart Grid, Using Power Consumption Data
title_full Detection of Potentially Compromised Computer Nodes and Clusters Connected on a Smart Grid, Using Power Consumption Data
title_fullStr Detection of Potentially Compromised Computer Nodes and Clusters Connected on a Smart Grid, Using Power Consumption Data
title_full_unstemmed Detection of Potentially Compromised Computer Nodes and Clusters Connected on a Smart Grid, Using Power Consumption Data
title_short Detection of Potentially Compromised Computer Nodes and Clusters Connected on a Smart Grid, Using Power Consumption Data
title_sort detection of potentially compromised computer nodes and clusters connected on a smart grid, using power consumption data
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7570659/
https://www.ncbi.nlm.nih.gov/pubmed/32906665
http://dx.doi.org/10.3390/s20185075
work_keys_str_mv AT almsharimohammed detectionofpotentiallycompromisedcomputernodesandclustersconnectedonasmartgridusingpowerconsumptiondata
AT tsaramirsisgeorgios detectionofpotentiallycompromisedcomputernodesandclustersconnectedonasmartgridusingpowerconsumptiondata
AT khadidosadilomar detectionofpotentiallycompromisedcomputernodesandclustersconnectedonasmartgridusingpowerconsumptiondata
AT buhariseyedmohammed detectionofpotentiallycompromisedcomputernodesandclustersconnectedonasmartgridusingpowerconsumptiondata
AT khanfazalqudus detectionofpotentiallycompromisedcomputernodesandclustersconnectedonasmartgridusingpowerconsumptiondata
AT khadidosalaaomar detectionofpotentiallycompromisedcomputernodesandclustersconnectedonasmartgridusingpowerconsumptiondata