Scheduling intrusion detection systems in resource-bounded cyber-physical systems

Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

Abstract

In order to be resilient to attacks, a cyber-physical system (CPS) must be able to detect attacks before they can cause significant damage. To achieve this, intrusion detection systems (IDS) may be deployed, which can detect attacks and alert human operators, who can then intervene. However, the resource-constrained nature of many CPS poses a challenge, since reliable IDS can be computationally expensive. Consequently, computational nodes may not be able to perform intrusion detection continuously, which means that we have to devise a schedule for performing intrusion detection. While a uniformly random schedule may be optimal in a purely cyber system, an optimal schedule for protecting CPS must also take into account the physical properties of the system, since the set of adversarial actions and their consequences depend on the physical systems. Here, in the context of water distribution networks, we study IDS scheduling problems in two settings and under the constraints on the available battery supplies. In the first problem, the objective is to design, for a given duration of time T, scheduling schemes for IDS so that the probability of detecting an attack is maximized within that duration. We propose efficient heuristic algorithms for this general problem and evaluate them on various networks. In the second problem, our objective is to design scheduling schemes for IDS so that the overall lifetime of the network is maximized while ensuring that an intruder attack is always detected. Various strategies to deal with this problem are presented and evaluated for various networks.

Original languageEnglish (US)
Title of host publicationCPS-SPC 2015 - Proceedings of the 1st ACM Workshop on Cyber-Physical Systems-Security and/or Privacy, co-located with CCS 2015
PublisherAssociation for Computing Machinery, Inc
Pages55-66
Number of pages12
ISBN (Electronic)9781450338271
DOIs
StatePublished - Oct 16 2015
Event1st ACM Workshop on Cyber-Physical Systems-Security and/or Privacy, CPS-SPC 2015 - Denver, United States
Duration: Oct 16 2015 → …

Publication series

NameCPS-SPC 2015 - Proceedings of the 1st ACM Workshop on Cyber-Physical Systems-Security and/or Privacy, co-located with CCS 2015

Conference

Conference1st ACM Workshop on Cyber-Physical Systems-Security and/or Privacy, CPS-SPC 2015
Country/TerritoryUnited States
CityDenver
Period10/16/15 → …

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Software

Fingerprint

Dive into the research topics of 'Scheduling intrusion detection systems in resource-bounded cyber-physical systems'. Together they form a unique fingerprint.

Cite this