Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System

被引:95
作者
Chen, Yuqi [1 ]
Poskitt, Christopher M. [1 ]
Sun, Jun [1 ]
机构
[1] Singapore Univ Technol & Design, Singapore, Singapore
来源
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) | 2018年
基金
新加坡国家研究基金会;
关键词
HYBRID; MODEL; DIAGNOSIS; KEYMAERA; ATTACKS;
D O I
10.1109/SP.2018.00016
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber-physical systems (CPS) consist of sensors, actuators, and controllers all communicating over a network; if any subset becomes compromised, an attacker could cause significant damage. With access to data logs and a model of the CPS, the physical effects of an attack could potentially be detected before any damage is done. Manually building a model that is accurate enough in practice, however, is extremely difficult. In this paper, we propose a novel approach for constructing models of CPS automatically, by applying supervised machine learning to data traces obtained after systematically seeding their software components with faults ("mutants"). We demonstrate the efficacy of this approach on the simulator of a real-world water purification plant, presenting a framework that automatically generates mutants, collects data traces, and learns an SVM-based model. Using cross-validation and statistical model checking, we show that the learnt model characterises an invariant physical property of the system. Furthermore, we demonstrate the usefulness of the invariant by subjecting the system to 55 network and code-modification attacks, and showing that it can detect 85% of them from the data logs generated at runtime.
引用
收藏
页码:648 / 660
页数:13
相关论文
共 46 条
[1]   Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant [J].
Adepu, Sridhar ;
Mathur, Aditya .
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :449-460
[2]   Using Process Invariants to Detect Cyber Attacks on a Water Treatment System [J].
Adepu, Sridhar ;
Mathur, Aditya .
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 :91-104
[3]  
Alves T., ARM WHITE PAPER, V3, P18
[4]  
Anati I., 2013, P 2 INT WORKSH HARDW, P1, DOI 10.1.1.405. 8266
[5]  
Brandl H., 2010, Proceedings of the Tenth International Conference on Quality Software (QSIC 2010), P3, DOI 10.1109/QSIC.2010.53
[6]  
C<prime>ardenas A. A., 2008, P USENIX WORKSH HOT
[7]  
Castelluccia C, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P400
[8]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[9]   Towards Learning and Verifying Invariants of Cyber-Physical Systems by Code Mutation [J].
Chen, Yuqi ;
Poskitt, Christopher M. ;
Sun, Jun .
FM 2016: FORMAL METHODS, 2016, 9995 :155-163
[10]   Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks [J].
Cheng, Long ;
Tian, Ke ;
Yao, Danfeng .
33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, :315-326