Safety envelope for security

作者: Ashish Tiwari , Bruno Dutertre , Dejan Jovanović , Thomas de Candia , Patrick D. Lincoln

DOI: 10.1145/2566468.2566483

关键词: State (computer science)ALARMReal-time computingHybrid systemSpoofing attackConstruct (python library)DetectorComputer securityEnvelope (motion)Computer science

摘要: We present an approach for detecting sensor spoofing attacks on a cyber-physical system. Our consists of two steps. In the first step, we construct safety envelope Under nominal conditions (that is, when there are no attacks), system always stays inside its envelope. second build attack detector: monitor that executes synchronously with and raises alarm whenever state falls outside synthesize envelopes using modifed machine learning procedure applied data collected from it is not under attack. experimental results show effectiveness our approach, also validate several novel features introduced in procedure.

参考文章(12)
Hovav Shacham, Karl Koscher, Alexei Czeskis, Franziska Roesner, Brian Kantor, Damon McCoy, Tadayoshi Kohno, Stefan Savage, Danny Anderson, Stephen Checkoway, Comprehensive experimental analyses of automotive attack surfaces usenix security symposium. pp. 6- 6 ,(2011)
John Rushby, Verification Diagrams Revisited: Disjunctive Invariants for Easy Verification computer aided verification. pp. 508- 520 ,(2000) , 10.1007/10722167_38
Simone Paoletti, Aleksandar Lj. Juloski, Giancarlo Ferrari-Trecate, René Vidal, Identification of hybrid systems - A tutorial European Journal of Control. ,vol. 13, pp. 242- 260 ,(2007) , 10.3166/EJC.13.242-260
René Vidal, Recursive identification of switched ARX systems Automatica. ,vol. 44, pp. 2274- 2287 ,(2008) , 10.1016/J.AUTOMATICA.2008.01.025
Patrick Cousot, Radhia Cousot, Abstract interpretation Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages - POPL '77. pp. 238- 252 ,(1977) , 10.1145/512950.512973
Hamza Fawzi, Paulo Tabuada, Suhas Diggavi, Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks IEEE Transactions on Automatic Control. ,vol. 59, pp. 1454- 1467 ,(2014) , 10.1109/TAC.2014.2303233
Weiyi Liu, Inseok Hwang, Robust estimation algorithm for a class of hybrid systems with unknown continuous fault inputs advances in computing and communications. pp. 136- 141 ,(2010) , 10.1109/ACC.2010.5530631
Ryohei Fujimaki, Takehisa Yairi, Kazuo Machida, An approach to spacecraft anomaly detection problem using kernel feature space knowledge discovery and data mining. pp. 401- 410 ,(2005) , 10.1145/1081870.1081917
Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Experimental Security Analysis of a Modern Automobile ieee symposium on security and privacy. pp. 447- 462 ,(2010) , 10.1109/SP.2010.34
Varun Chandola, Arindam Banerjee, Vipin Kumar, Anomaly detection: A survey ACM Computing Surveys. ,vol. 41, pp. 15- ,(2009) , 10.1145/1541880.1541882