Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems

被引:152
作者
Mitchell, Robert [1 ]
Chen, Ing-Ray [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Dept Comp Sci, Falls Church, VA 22043 USA
关键词
Intrusion detection; sensor actuator networks; medical cyber physical systems; healthcare; security; safety; ADMISSION CONTROL; PERFORMANCE ANALYSIS; CONTROL ALGORITHMS; OPTIMIZATION; MANAGEMENT;
D O I
10.1109/TDSC.2014.2312327
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose and analyze a behavior-rule specification-based technique for intrusion detection of medical devices embedded in a medical cyber physical system (MCPS) in which the patient's safety is of the utmost importance. We propose a methodology to transform behavior rules to a state machine, so that a device that is being monitored for its behavior can easily be checked against the transformed state machine for deviation from its behavior specification. Using vital sign monitor medical devices as an example, we demonstrate that our intrusion detection technique can effectively trade false positives off for a high detection probability to cope with more sophisticated and hidden attackers to support ultra safe and secure MCPS applications. Moreover, through a comparative analysis, we demonstrate that our behavior-rule specification-based IDS technique outperforms two existing anomaly-based techniques for detecting abnormal patient behaviors in pervasive healthcare applications.
引用
收藏
页码:16 / 30
页数:15
相关论文
共 36 条
[1]   Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks [J].
Al-Hamadi, Hamid ;
Chen, Ing-Ray .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2013, 10 (02) :189-203
[2]  
Anand M., 2006, SCADA NETW EMB CONTR
[3]  
[Anonymous], 2005, Proceedings 1st ACM International Workshop on Quality of service Security in Wireless and Mobile Networks
[4]  
Asfaw B., 2010, CRiSIS IEEE, P1
[5]  
Bastani F. B., 1994, Annual Reliability and Maintainability Symposium. 1994 Proceedings (Cat. No.94CH3391-0), P442, DOI 10.1109/RAMS.1994.291149
[6]   A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems [J].
Carcano, A. ;
Coletta, A. ;
Guglielmi, M. ;
Masera, M. ;
Fovino, I. Nai ;
Trombetta, A. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2011, 7 (02) :179-186
[7]  
Cardenas A., 2009, POWER ENERGY ENG C, P1
[8]   Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks [J].
Chen, Ing-Ray ;
Speer, Anh Phan ;
Eltoweissy, Mohamed .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (02) :161-176
[9]   Analysis of replicated data with repair dependency [J].
Chen, IR ;
Wang, DC .
COMPUTER JOURNAL, 1996, 39 (09) :767-779
[10]   EFFECT OF ARTIFICIAL-INTELLIGENCE PLANNING-PROCEDURES ON SYSTEM RELIABILITY [J].
CHEN, IR ;
BASTANI, FB .
IEEE TRANSACTIONS ON RELIABILITY, 1991, 40 (03) :364-369