Chaire de cyberdéfense des systèmes navals
  • 🇫🇷 Français
  • News
  • Alumni
  • Naval cyber-range
  • Ongoing Theses
  • Supervisory Team
  • Who are we?
  • Governance

Quentin Saint-Christophe

Directeur(s): Abdel-Ouahab Boudraa
Encadrant(s): Christophe Osswald & Cyril Ray

Information fusion

SUJET DE THÈSE

Detection of Malfunctions and Malicious Acts Based on Multi-Source Vulnerable Information Fusion

Abstract

Information fusion enables the combination of multiple sources to generate knowledge or extract more coherent intelligence than would be possible with individual sources alone. These sources include GPS, surveillance cameras, databases, navigation systems, or acquired knowledge. To verify the integrity of information in the context of vulnerable data sources, a key strategy is to identify and discard falsified or altered information. Such compromised data can bias and mislead decision-making in the fusion process. Therefore, identifying and flagging the sources responsible for producing this compromised data helps to prevent future degradation of information quality.

Objective :

The goal of this study is to detect altered information sources to enable the synthesis of exclusively reliable information through fusion. The increasing number of interconnected embedded systems presents a growing threat to the integrity of exchanged information within these networks, which include sensors, databases, and even human observations describing the surrounding environment. The information originating from these sources is often asynchronous, heterogeneous, and vulnerable, with this vulnerability leading to inconsistencies across the multi-source environment. Detecting and classifying the origin and vector of these inconsistencies helps to prevent potential manipulations.

Methodology :

Single-source anomaly detection is often ineffective for real-time processing. In a multi-source information environment, it is assumed that the majority of sources are reliable and provide an accurate description of the environment. By assessing the coherence of the entire dataset, it is possible to detect and isolate sources that contribute to inconsistencies.

To achieve this, a hysteresis thresholding algorithm is developed based on multiple criteria, including:

  • Definition of criteria for information sources: These criteria include data attributes such as topology, temporal coherence, source dependencies, and overall consistency. They serve as additional information about the sources.
  • Development of a trust propagation function tailored to the context: This function establishes an initial level of trust for each source, which is then dynamically updated based on its reliability over time.
  • Formulation of a robust discordance criterion to identify and filter out altered sources.
  • Adaptation of a fusion rule for information from verified reliable sources, along with a decision-making method for the fused information.
  • Design of a classification algorithm to categorize altered sources into two types:
    • Degraded sources: Cases such as sensor degradation due to environmental conditions or other non-malicious factors should be detected and flagged accordingly.
    • Maliciously tampered sources: Intentional modifications, such as cyber-attacks, sensor manipulation, or unauthorized intrusions into information systems, represent deliberate falsifications and should be treated as security threats.

Conclusion

The vulnerability of information systems is increasing alongside the growing volume of exchanged information, posing a significant threat to operational environments. The ability of information sources to be compromised is directly linked to the rise in data exchange, making it crucial to extract new contextual information both a priori and in real time. By developing single-source characterization techniques, inter-source discordance metrics, and multi-source decision-making tools, this research ultimately seeks to leverage the increasing flow of data to enhance the integrity of information systems.

Publications

Quentin Saint-Christophe, Christophe Osswald, Cyril Ray, Abdel-Ouahab Boudraa, Vulnérabilités d'un système de fusion crédal à des sources corrompues : analyses et mesures de modèles d'attaque. In EGC 2024, vol. RNTI-E-40, pp.271-278.
Quentin SAINT-CHRISTOPHE, Christophe OSSWALD, Abdel-Ouahab BOUDRAA, Cyril RAY, Du concept de conflit cohérent en fusion d’informations vulnérables. XXVIIIème Colloque Francophone de Traitement du Signal et des Images (GRETSI'22), Sept 2022, Nancy, France.
Retour
  • Naval Systems Cyber Defense Chair
  • École navale
  • BCRM Brest - CC 600
  • 29240 BREST Cedex 9
  • chairecyber@ecole-navale.fr
Legal Notice
Supported by
cybersecurity
cybersecurity research
naval cybersecurity
Shortcuts
  • Students
  • Researchers
  • Industry partners
  • The Chair
  • PhD Research
  • Alumni
  • Publications
  • Supervisory Team
  • Naval cyber-range
  • News
Contact Us
cyberdefense cybersecurity research naval cybersecurity