Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems

W. Abbas, Aron Laszka, Yevgeniy Vorobeychik, X. Koutsoukos
{"title":"Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems","authors":"W. Abbas, Aron Laszka, Yevgeniy Vorobeychik, X. Koutsoukos","doi":"10.1145/2808705.2808711","DOIUrl":null,"url":null,"abstract":"In order to be resilient to attacks, a cyber-physical system (CPS) must be able to detect attacks before they can cause significant damage. To achieve this, \\emph{intrusion detection systems} (IDS) may be deployed, which can detect attacks and alert human operators, who can then intervene. However, the resource-constrained nature of many CPS poses a challenge, since reliable IDS can be computationally expensive. Consequently, computational nodes may not be able to perform intrusion detection continuously, which means that we have to devise a schedule for performing intrusion detection. While a uniformly random schedule may be optimal in a purely cyber system, an optimal schedule for protecting CPS must also take into account the physical properties of the system, since the set of adversarial actions and their consequences depend on the physical systems. Here, in the context of water distribution networks, we study IDS scheduling problems in two settings and under the constraints on the available battery supplies. In the first problem, the objective is to design, for a given duration of time $T$, scheduling schemes for IDS so that the probability of detecting an attack is maximized within that duration. We propose efficient heuristic algorithms for this general problem and evaluate them on various networks. In the second problem, our objective is to design scheduling schemes for IDS so that the overall lifetime of the network is maximized while ensuring that an intruder attack is always detected. Various strategies to deal with this problem are presented and evaluated for various networks.","PeriodicalId":144851,"journal":{"name":"Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2808705.2808711","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

In order to be resilient to attacks, a cyber-physical system (CPS) must be able to detect attacks before they can cause significant damage. To achieve this, \emph{intrusion detection systems} (IDS) may be deployed, which can detect attacks and alert human operators, who can then intervene. However, the resource-constrained nature of many CPS poses a challenge, since reliable IDS can be computationally expensive. Consequently, computational nodes may not be able to perform intrusion detection continuously, which means that we have to devise a schedule for performing intrusion detection. While a uniformly random schedule may be optimal in a purely cyber system, an optimal schedule for protecting CPS must also take into account the physical properties of the system, since the set of adversarial actions and their consequences depend on the physical systems. Here, in the context of water distribution networks, we study IDS scheduling problems in two settings and under the constraints on the available battery supplies. In the first problem, the objective is to design, for a given duration of time $T$, scheduling schemes for IDS so that the probability of detecting an attack is maximized within that duration. We propose efficient heuristic algorithms for this general problem and evaluate them on various networks. In the second problem, our objective is to design scheduling schemes for IDS so that the overall lifetime of the network is maximized while ensuring that an intruder attack is always detected. Various strategies to deal with this problem are presented and evaluated for various networks.
资源有限网络物理系统中的入侵检测调度系统
为了能够抵御攻击,网络物理系统(CPS)必须能够在攻击造成重大损害之前检测到攻击。为了实现这一点,可能会部署\emph{入侵检测系统}(IDS),它可以检测攻击并提醒操作员,然后操作员可以进行干预。然而,许多CPS的资源约束性质带来了挑战,因为可靠的IDS在计算上可能非常昂贵。因此,计算节点可能无法连续执行入侵检测,这意味着我们必须为执行入侵检测设计一个时间表。虽然在纯粹的网络系统中,统一的随机调度可能是最优的,但保护CPS的最佳调度还必须考虑到系统的物理特性,因为对抗行动的集合及其后果取决于物理系统。本文以配水管网为例,研究了两种情况下的IDS调度问题。在第一个问题中,目标是在给定的时间$T$内设计IDS的调度方案,以便在该时间内最大限度地检测到攻击。针对这一普遍问题,我们提出了有效的启发式算法,并在不同的网络上进行了评估。在第二个问题中,我们的目标是为IDS设计调度方案,以便最大化网络的总体生命周期,同时确保始终检测到入侵者攻击。针对不同的网络,提出并评估了处理这一问题的各种策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信