A dependable architecture to mitigate distributed denial of service attacks on network-based control systems

被引:8
作者
Beitollahi, Hakem [1 ]
Deconinck, Geert [1 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn, Louvain, Belgium
关键词
Distributed denial of service (DDoS) attacks; Network-based control systems; Packet loss; Delay jitter; Location hiding; Network security;
D O I
10.1016/j.ijcip.2011.06.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, the Internet has become a promising platform for network-based control systems (NBCS), where packets are used to transmit feedback and control signals between a plant and controllers. On the other hand, today's distributed denial of service (DDoS) attacks cause significant disruption to the Internet, which threaten the operation of NBCS. This paper proposes an architecture called Fosel (filtering with the help of an overlay security layer) to protect NBCS from DDoS attacks. Fosel is a DoS defense technique that drops excess traffic effectively, thus reducing the overhead at the victim. The Fosel architecture is constructed using a combination of access point proxies, packet authentications, routing via onion tunnels, secret green nodes, rate limiter routers and a selective filter. For performance evaluation of Fosel, we use a networked proportional integral (PI) controller and a second-order plant (dc motor speed) as a case study. Emulab machines are used to implement the Fosel architecture. Real DoS toolkits are used to attack the plant's server and the Fosel architecture. Empirical results show that the Fosel architecture significantly reduces the likelihood of successful DDoS attacks to negligible levels. Practical results indicate that the Fosel architecture keeps communication alive between controllers and the plant. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:107 / 123
页数:17
相关论文
共 28 条
  • [1] Andersen D.G., 2003, P 4 USENIX S INT TEC
  • [2] [Anonymous], 30 IFAC WORKSH REAL
  • [3] [Anonymous], 1998, Real-Time Control Systems with Delays
  • [4] Beitollahi Hakem, 2008, 2008 14th IEEE Pacific Rim International Symposium on Dependable Computing, P104, DOI 10.1109/PRDC.2008.46
  • [5] BEITOLLAHI H, 2008, P 7 IEEE INT S NETW, P19
  • [6] CLOSED-LOOP CONTROL OF SYSTEMS OVER A COMMUNICATIONS NETWORK WITH QUEUES
    CHAN, H
    OZGUNER, U
    [J]. INTERNATIONAL JOURNAL OF CONTROL, 1995, 62 (03) : 493 - 510
  • [7] Network-based control systems: A tutorial
    Chow, MY
    Tipsuwan, Y
    [J]. IECON'01: 27TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-3, 2001, : 1593 - 1602
  • [8] Deconinck G., 2007, P 37 ANN IEEE IFIP I
  • [9] Dingledine R, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, P303
  • [10] Dondossola G., 2009, P 39 ANN IEEE IFIP I