CORGIDS: A Correlation-based Generic Intrusion Detection System

被引:18
作者
Aggarwal, Ekta [1 ]
Karimibiuki, Mehdi [1 ]
Pattabiraman, Karthik [1 ]
Ivanov, Andre [1 ]
机构
[1] Univ British Columbia, Vancouver, BC, Canada
来源
CPS-SPC'18: PROCEEDINGS OF THE 2018 WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY AND PRIVACY | 2018年
基金
加拿大自然科学与工程研究理事会;
关键词
Intrusion Detection Systems; Internet-of-Things; Cyber-physical Systems; Security; Generic Intrusion Detection Model; CYBER; INVARIANTS;
D O I
10.1145/3264888.3264893
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cyber-physical systems (CPS) consist of software and physical components which are knitted together and interact with each other continuously. CPS have been targets of security attacks due to their safety-critical nature and relative lack of protection. Specification based intrusion detection systems (IDS) using data, temporal, data temporal and time, and logical correlations have been proposed in the past. But none of the approaches except the ones using logical correlations take into account the main ingredient in the operation of CPS, namely the use of physical properties. On the other hand, IDS that use physical properties either require the developer to define invariants manually, or have designed their IDS for a specific CPS. This paper proposes CORGIDS, a generic IDS capable of detecting security attacks by inferring the logical correlations of the physical properties of a CPS, and checking if they adhere to the predefined framework. We build a CORGIDS-based prototype and demonstrate its use for detecting attacks in the two CPS. We find that CORGIDS achieves a precision of 95.70%, and a recall of 87.90%, with modest memory and performance overheads.
引用
收藏
页码:24 / 35
页数:12
相关论文
共 35 条
[1]   Using Process Invariants to Detect Cyber Attacks on a Water Treatment System [J].
Adepu, Sridhar ;
Mathur, Aditya .
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 :91-104
[2]  
Aliabadi Maryam Raiyat, 2017, ARTINALI DYNAMIC INV
[3]  
[Anonymous], 2016, CCS, DOI [DOI 10.1145/2976749, DOI 10.1145/2976749.2978388]
[4]  
Ardupilot SITL, ARD SOFTW LOOP
[5]   Detecting Kernel-Level Rootkits Using Data Structure Invariants [J].
Baliga, Arati ;
Ganapathy, Vinod ;
Iftode, Liviu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (05) :670-684
[6]   Automatic Inference and Enforcement of Kernel Data Structure Invariants [J].
Baliga, Arati ;
Ganapathy, Vinod ;
Iftode, Liviu .
24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, :77-86
[7]  
Bernieri G, 2016, 2016 INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT), P454, DOI 10.1109/CoDIT.2016.7593605
[8]  
BESCHASTNIKH I., 2011, P 19 ACM SIGSOFT S 1, P267, DOI [10.1145/2025113.2025151, DOI 10.1145/2025113.2025151]
[9]  
Checkoway D., 2011, P USENIX SEC S SAN F, P6
[10]  
Chen Y., 2018, ARXIV180100903