{"title":"Intrusion Detection System for Embedded Systems","authors":"F. Tabrizi, K. Pattabiraman","doi":"10.1145/2843966.2843975","DOIUrl":null,"url":null,"abstract":"Embedded devices are widely used in modern life. Smart meters are installed at homes, measure electricity consumption, and provide a two-way communication with the utility server. Modern cars consist of tens of Electronic Control Units (ECU) that control different components of the car such as speed, door locks, and breaks. Medical devices such as pacemakers and insulin pumps are implanted in the bodies of patients, and control their heart rate and insulin level. These devices are performing critical tasks and hence, their security is important. However, in recent years, researchers have found vulnerabilities in all these classes of devices, and have successfully demonstrated attacks against them. Given the critical nature of use cases of embedded systems, building Intrusion Detection System (IDS) for them is a necessity. However, embedded systems have constraints that make building IDS for them challenging. One of these constraints is memory. Memory capacity of embedded devices may be as small as several hundreds of kilobytes. This makes traditional solutions for building IDSes unusable. In my research, we analyze the security of embedded devices. Based on the results of my analysis, we develop techniques to automatically build IDSes for embedded devices, within their memory capacity, while optimizing the detection rate of the IDS with respect to the user's criteria. This research, makes developing IDSes for different classes of embedded systems, and with different memory capacities easier, and improves their security.","PeriodicalId":224203,"journal":{"name":"Proceedings of the Doctoral Symposium of the 16th International Middleware Conference","volume":"83 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Doctoral Symposium of the 16th International Middleware Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2843966.2843975","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Embedded devices are widely used in modern life. Smart meters are installed at homes, measure electricity consumption, and provide a two-way communication with the utility server. Modern cars consist of tens of Electronic Control Units (ECU) that control different components of the car such as speed, door locks, and breaks. Medical devices such as pacemakers and insulin pumps are implanted in the bodies of patients, and control their heart rate and insulin level. These devices are performing critical tasks and hence, their security is important. However, in recent years, researchers have found vulnerabilities in all these classes of devices, and have successfully demonstrated attacks against them. Given the critical nature of use cases of embedded systems, building Intrusion Detection System (IDS) for them is a necessity. However, embedded systems have constraints that make building IDS for them challenging. One of these constraints is memory. Memory capacity of embedded devices may be as small as several hundreds of kilobytes. This makes traditional solutions for building IDSes unusable. In my research, we analyze the security of embedded devices. Based on the results of my analysis, we develop techniques to automatically build IDSes for embedded devices, within their memory capacity, while optimizing the detection rate of the IDS with respect to the user's criteria. This research, makes developing IDSes for different classes of embedded systems, and with different memory capacities easier, and improves their security.