On-board Diagnosis: A First Step from Detection to Prevention of Intrusions on Avionics Applications

被引:0
作者
Damien, Alienor [1 ]
Gimenez, Pierre-Francois [2 ]
Feyt, Nathalie [1 ]
Nicomette, Vincent [2 ]
Kaaniche, Mohamed [2 ]
Alata, Eric [2 ]
机构
[1] Thales AVS, Toulouse, France
[2] Univ Toulouse, LAAS CNRS, Toulouse, France
来源
2020 IEEE 31ST INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2020) | 2020年
关键词
Intrusion Detection System; Security; Avionics; Embedded; Real-Time; CLASSIFICATION;
D O I
10.1109/ISSRE5003.2020.00041
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, air travel is one of the safest transportation means. While safety is historically well integrated into avionics systems, it is becoming increasingly important to take into account the security of such systems for the future. In particular, Host-based Intrusion Detection Systems (HIDS) are commonly used in traditional information systems to improve their security. The adaptation of such systems for deployment inside an aircraft has been studied in another work and has shown to be effective in detecting anomalous behavior in an avionic application. However, the detection itself is not sufficient to provide an on-board reaction, and to prevent such intrusion. This paper proposes to improve such HIDS by introducing a signature-based system capable of providing a first diagnosis after the detection of an anomalous behavior. The proposed diagnosis approach is based on the definition of the signature of an alert, and its comparison with a knowledge database that is regularly updated throughout aircraft lifetime. This approach has been implemented on a real avionic computer and yielded good results in terms of classification accuracy and resources consumption.
引用
收藏
页码:358 / 368
页数:11
相关论文
共 19 条
[1]  
[Anonymous], 2017, International Journal of Hybrid Intelligent Systems, DOI DOI 10.3233/HIS-170247
[2]  
Bailey M, 2007, LECT NOTES COMPUT SC, V4637, P178
[3]  
Christodorescu Mihai, 2008, 1st India Software Engineering Conference. ISEC 2008, P5
[4]   Attack Injection into Avionic Systems through Application Code Mutation [J].
Damien, Alienor ;
Feyt, Nathalie ;
Nicomette, Vincent ;
Alata, Eric ;
Kaaniche, Mohamed .
2019 IEEE/AIAA 38TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2019,
[5]   Implementation of a Host-based Intrusion Detection System for Avionic Applications [J].
Damien, Alienor ;
Marcourt, Michael ;
Nicomette, Vincent ;
Alata, Eric ;
Kaaniche, Mohamed .
2019 IEEE 24TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2019), 2019, :178-187
[6]   Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware [J].
Das, Sanjeev ;
Liu, Yang ;
Zhang, Wei ;
Chandramohan, Mahintham .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) :289-302
[7]   HIDS: A host based intrusion detection system for cloud computing environment [J].
Deshpande P. ;
Sharma S.C. ;
Peddoju S.K. ;
Junaid S. .
International Journal of System Assurance Engineering and Management, 2018, 9 (03) :567-576
[8]  
Dosilovic FK, 2018, 2018 41ST INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P210, DOI 10.23919/MIPRO.2018.8400040
[9]   A sense of self for unix processes [J].
Forrest, S ;
Hofmeyr, SA ;
Somayaji, A ;
Longstaff, TA .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :120-128
[10]  
Fumera G, 2002, LECT NOTES COMPUT SC, V2388, P68