SlideShare a Scribd company logo
Effect of Intrusion Detection and
Response on Reliability of Cyber
Physical Systems
Robert Mitchell, Ing-Ray Chen
Paper Presentation by Michael Matarazzo (mfm11@vt.edu)
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
Overview
I. Introduction
II. Reference Model
III.System Model and Analysis
IV.Parameterization Process
V. Numerical Data with Interpretations
VI.Conclusions and Future Work
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
I. Introduction
๏‚ง Cyber Physical System (CPS)
๏‚ง A system using sensors, actuators, control units, and other physical
objects to control and protect a physical infrastructure.
๏‚ง Failure can have severe consequences, thus it is very important to
protect it from malicious attacks.
๏‚ง Reliability of CPS
๏‚ง This paper explores the reliability of a CPS designed to sustain malicious
attacks over time without energy replenishment.
๏‚ง A CPS usually operates in some hostile environment where energy
replenishment may not be possible and nodes may be compromised.
๏‚ง To prolong the system lifetime, an Intrusion Detection and Response
System (IDRS) must effectively detect malicious nodes without
unnecessarily wasting energy.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
I. Introduction
๏‚ง Intrusion Detection System (IDS) Designs
๏‚ง Signature Based
๏‚ง Oman and Phillips [22] study an IDS for CPSs that tests an automated
transform from XML profile to Snort signature in an electricity
distribution laboratory.
๏‚ง Anomaly Based
๏‚ง Barbosa and Pras [2] study an IDS for CPSs that tests state machine
and Markov chain approaches to traffic analysis on a water distribution
system based on a comprehensive vulnerability assessment.
๏‚ง Specification Based
๏‚ง Cheung, et al. [12] study a specification based IDS that uses PVS to
transform protocol, communication patterns, and service availability
specifications into a format compatible with EMERALD.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
I. Introduction
๏‚ง This paper uses a Specification based approach
with the following features:
๏‚ง A specification is automatically mapped into a state
machine consisting of good and bad states.
๏‚ง For intrusion detection, nodeโ€™s deviation from good
states is measured at runtime.
๏‚ง Specification-based techniques are applied to host-
level intrusion detection only.
๏‚ง System-level intrusion detection is devised based on
multitrust to yield low false alarm probability.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
I. Introduction
๏‚ง Addressing Response
๏‚ง Unlike intrusion detection, little work has been done on the
response aspect of IDRS.
๏‚ง This design addresses both intrusion detection and
response issues, with the goal to maximize the CPS
lifetime.
๏‚ง Methodology
๏‚ง We use a probability model-based analysis to assess the
reliability of a CPS w/ IDRS.
๏‚ง A variety of attacker behaviors are considered, including
persistent, random, and insidious.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
I. Introduction
๏‚ง To achieve high reliability, we identify the
best design settings of the detection strength
and response strength to best balance energy
conservation vs. intrusion tolerance given a
set of parameter values characterizing the
operational environment and network
conditions.
๏‚ง Parameterization of the model using the
properties of the IDS system is one major
contribution of the paper.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
A. Reference CPS Model
๏‚ง Comprised of 128 sensor-carried mobile nodes,
each of which ranges its neighbors periodically, uses
its sensor to measure any detectable phenomena
nearby, and transmits a CDMA waveform.
๏‚ง Neighbors receiving the waveform transform the
timing of the PN code and RF carrier into distance.
๏‚ง Each node performs sensing and reporting functions
to provide information to upper layer control
devices and utilizes its ranging function for node
localization and intrusion detection.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
๏‚ง It is a special case of a single-enclave system with
homogeneous nodes.
๏‚ง The IDS functionality is distributed to all nodes in the
system for intrusion and fault tolerance.
๏‚ง On top of the mobile nodes sits a control node
responsible for setting system parameters in response
to dynamically changing conditions, such as changes
of attacker strength.
๏‚ง The control module is assumed to be fault and
intrusion free through security and hardware
protection mechanisms against capture attacks and
hardware failure.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
๏‚ง Fig. 1 depicts the reference
CPS:
๏‚ง The mobile nodes (RTUs) are
capable of sensing physical
environments as well as actuating
and controlling the underlying
physical objects in the CPS.
๏‚ง On top is a control unit (MTU)
which receives sensing data from
the nodes and determines actions
to be performed them.
๏‚ง MTU sends actuator commands to
trigger the actuating devices of the
mobile nodes.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
๏‚ง Real World Applications of Reference CPS
๏‚ง Disaster Recovery โ€“ a group of mobile nodes with
motion/video sensing and actuating capabilities cooperating
under the control of a disaster corrective control unit to protect
and recover physical objects.
๏‚ง Military Patrol โ€“ a group of mobile patrol nodes equipped with
motion sensing and fighting capabilities cooperating under the
control of a control unit to protect and control physical objects.
๏‚ง Unmanned aircraft systems - a group of UAVs equipped with
sensing and fighting capabilities cooperating under the control of
a remote control unit to control and protect physical objects.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
๏‚ง MTU (control unit) contains the control logic, provides
management services, and implements the broad
strategic control functions.
๏‚ง This reference CPS is highly mobile (nodes are mobile)
and safety-critical, using ad-hoc networking with
bidirectional flows.
๏‚ง Host IDS design is based on local monitoring.
๏‚ง System-level IDS design is based on the voting of
neighbor monitoring nodes.
๏‚ง These techniques can be generically applied to any
network structure used in a CPS.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
B. Security Failure
๏‚ง Byzantine Fault Model
๏‚ง The system fails if 1/3 or more of the nodes are compromised.
๏‚ง Represents the situation in which the control unit is unable to obtain
any sensor reading consensus.
๏‚ง Impairment Failure
๏‚ง The system fails because an undetected compromised node
performing active attacks has impaired the functionality of the system.
๏‚ง This is modeled by defining an impairment failure attack period by a
compromised node beyond which the system cannot sustain the
damage.
๏‚ง Represents the situation when the system is severely impaired due to
impairment by an undetected bad node (especially an actuator) over
an impairment failure period.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
C. Attack Model
๏‚ง We consider capture attacks which turn a good node
into a bad insider node:
๏‚ง At the sensor-actuator layer of the CPS architecture, a bad
node can perform data spoofing attacks and bad command
execution attacks.
๏‚ง At the networking layer, a bad node can perform various
communication attacks such as selective forwarding, packet
dropping, packet flooding, etc. to disrupt the systemโ€™s
packet routing capability.
๏‚ง At the control layer, a bad node can perform control-level
attacks including aggregated data and command spoofing
attacks.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
๏‚ง Our primary interest is on capture attacks of sensor-actuator nodes:
๏‚ง Persistent attacker - performs attacks whenever it has a chance,
with ๐ฉ๐ซ๐จ๐›๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ = ๐Ÿ and a primary objective to cause impairment
failure.
๏‚ง Random attacker - performs attacks randomly with ๐ฉ๐ซ๐จ๐›๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ =
๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž and a primary objective of evading detection.
๏‚ง It may take a longer time to cause impairment failure.
๏‚ง It may increase the probability of a Byzantine security failure.
๏‚ง Insidious attacker - is hidden all the time to evade detection until a
critical mass of compromised nodes is reached.
๏‚ง It then performs an โ€œall inโ€ attack.
๏‚ง The primary objective is to maximize the security failure probability caused by
either impairment or Byzantine failure.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
D. Host Intrusion Detection (two core techniques):
๏‚ง Behavior rule specification
๏‚ง To specify the behavior of an entity (sensor or actuator) by a set of rules from which a state
machine is automatically derived.
๏‚ง Then, node misbehavior can be assessed by observing the behaviors of the node against
the state machine (or behavior rules).
๏‚ง Vector similarity specification
๏‚ง To compare similarity of a sequence of sensor readings, commands, or votes among entities
performing the same set of functions.
๏‚ง A state machine is also automatically derived from which a similarity test is performed to
detect outliers.
๏‚ง The states derived in the state machine would be labeled as secure vs. insecure.
๏‚ง A monitoring node then applies snooping and overhearing techniques observing the
percentage of time a neighbor node is in secure states over the intrusion detection
interval ๐‘ป๐‘ฐ๐‘ซ๐‘บ.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
๏‚ง A longer time in secure states indicates greater specification
compliance, while a shorter time indicates less โ€“ if ๐‘ฟ๐’Š falls below ๐‘ช๐‘ป,
node ๐’Š is considered compromised.
๏‚ง Application of these two host IDS techniques to reference CPS:
๏‚ง A monitoring node periodically determines a sequence of locations of a
sensor-carried mobile node within radio range and detects if the
location sequence (corresponding to the state sequence) deviates from
the expected location sequence.
๏‚ง A monitoring node periodically collects votes from neighbor nodes and
detects dissimilarity of vote sequences for outlier detection.
๏‚ง Measurement of compliance degree is not perfect and can be
affected by noise and unreliable wireless communication in the CPS.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
๏‚ง We model the compliance degree by a random variable ๐‘ฟ with ๐‘ฎ โˆ™ =
๐‘ฉ๐’†๐’•๐’‚(๐œถ, ๐œท) distribution, with value 0 indicating that the output is totally
unacceptable (zero compliance), and 1 indicating the output is totally acceptable
(perfect compliance)
๏‚ง ๐‘ฎ ๐’‚ , ๐ŸŽ โ‰ค ๐’‚ โ‰ค ๐Ÿ, is given by:
๏‚ง And the expected value of ๐‘ฟ is given by:
๏‚ง The ๐œถ and ๐œท parameters are to be estimated based on the method of maximum
likelihood by using the compliance degree history collected during the systemโ€™s
testing phase.
๏‚ง The system is tested with its anticipated attacker event profile and the
compliance degree is assessed using the specification-based host IDS
described above.
II. Reference Model
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
๏‚ง A nodeโ€™s anticipated event profile describes a
nodeโ€™s behaviors, and predicts the next state the
node will be entering upon an event occurrence.
๏‚ง A persistent attacker will likely go to another bad
state because it performs attacks continuously.
๏‚ง A random attacker will likely go to a bad state in
accordance to its random attack probability.
๏‚ง A good node on the other hand will likely go to
another good state because it complies with its
behavior rules, unless the detection of its behaviors is
hindered by noise or wireless channel error.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
๏‚ง The compliance degree history is the realization of a sequence of random variables
(๐’„๐Ÿ, ๐’„๐Ÿ, โ€ฆ , ๐’„๐’) and ๐’ is the total number of compliance degree outputs observed.
๏‚ง The maximum likelihood estimates of ๐œถ and ๐œท are obtained by numerically solving:
๏‚ง where
๏‚ง A simpler model involves a single parameter ๐‘ฉ๐’†๐’•๐’‚(๐œท) distribution with ๐œถ = ๐Ÿ.
๏‚ง The density is ๐œท(๐Ÿ โˆ’ ๐’™)๐œทโˆ’๐Ÿ
for ๐ŸŽ โ‰ค ๐’™ โ‰ค ๐Ÿ, and 0 otherwise.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
๏‚ง Host intrusion detection is characterized by:
๏‚ง ๐’‘๐Ÿ๐ง (probability of per-host IDS false negative)
๏‚ง ๐‘๐Ÿ๐ฉ (probability of per-host IDS false positive)
๏‚ง We consider a System minimum compliance threshold (๐‘ช๐‘ป) criterion:
๏‚ง If ๐‘ฟ๐’ƒ (compliance degree of a bad node) > ๐‘ช๐‘ป, then there is a false negative.
๏‚ง Assuming ๐‘ฟ๐‘ is modeled by ๐‘ฎ โˆ™ = ๐‘ฉ๐’†๐’•๐’‚(๐œถ, ๐œท) distribution:
๏‚ง ๐’‘๐Ÿ๐ง = ๐๐ซ ๐‘ฟ๐’ƒ > ๐‘ช๐‘ป = ๐Ÿ โˆ’ ๐‘ฎ(๐‘ช๐‘ป)
๏‚ง If ๐‘ฟ๐’ˆ (compliance degree of a good node) < ๐‘ช๐‘‡, then there is a false positive.
๏‚ง Assuming ๐‘ฟ๐’ˆ is modeled by the same distribution:
๏‚ง ๐’‘๐Ÿ๐ฉ = ๐๐ซ ๐‘ฟ๐’ˆ โ‰ค ๐‘ช๐‘ป = ๐‘ฎ(๐‘ช๐‘ป)
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
๏‚ง These two probabilities are largely affected by
the setting of ๐‘ช๐‘ป;
๏‚ง A large ๐‘ช๐‘ป induces a small false negative
probability at the expense of a large false
positive probability, and vice versa;
๏‚ง A proper setting of ๐‘ช๐‘ป in response to attacker
strength detected at runtime helps maximize
the system lifetime.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
E. System Intrusion Detection
๏‚ง Based on majority voting of host IDS results to cope with incomplete
and uncertain information available to nodes;
๏‚ง Involves the selection of m detectors as well as the invocation interval
๐‘ป๐‘ฐ๐‘ซ๐‘บ to best balance energy conservation vs. intrusion tolerance for
achieving high reliability.
๏‚ง Each node periodically exchanges its routing information, location, and
identifier with its neighbor nodes, and a coordinator is selected
randomly among neighbors so that the adversaries will not have
specific targets.
๏‚ง Randomness is added to this selection process by introducing a keyed
hash function.
๏‚ง The node with the smallest returned hash value would then become
the coordinator.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
๏‚ง Because the candidate nodes know each otherโ€™s identifier and location, they
can, without trading information, execute the hash function to determine
which node would be the coordinator.
๏‚ง The coordinator selects m detectors randomly (including itself) and lets all
detectors know each othersโ€™ identities so that each voter can send its yes or
no vote to other detectors.
๏‚ง At the end of the voting process, all detectors will know the same result.
๏‚ง The node is diagnosed as good, or as bad based on the majority vote.
๏‚ง The system IDS is characterized by ๐œฌ๐Ÿ๐ง and ๐œฌ๐Ÿ๐ฉ, which are two false
alarm probabilities derived in the paper.
๏‚ง They are not constant but vary dynamically, depending on the percentage
of bad nodes in the system when majority voting is performed.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
II. Reference Model
F. Response
๏‚ง Our IDRS reacts to malicious events at runtime by adjusting ๐‘ช๐‘ป.
๏‚ง Upon sensing increasing attacker strength, it can increase ๐‘ช๐‘ป with the
objective to prevent impairment security failure.
๏‚ง Results in a smaller false negative probability, reducing the number of bad nodes in
the system, and decreasing the probability of impairment security failure.
๏‚ง However, it could reduce the number of good nodes in the system due to a resulting
larger false positive probability, thus increasing the probability of a Byzantine failure.
๏‚ง To compensate, the IDRS increases the audit rate or number of detectors to reduce
the false positive probability at the expense of more energy consumption.
๏‚ง The relationship between the minimum compliance threshold ๐‘ช๐‘ป set versus
๐’‘๐Ÿ๐ง and ๐’‘๐Ÿ๐ฉ must be determined at static time so the system can adjust ๐‘ช๐‘ป
dynamically in response to malicious events detected at runtime.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
III. System Model and Analysis
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
III. System Model and Analysis
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
III. System Model and Analysis
๏‚ง The theoretical model utilizes
stochastic Petri net (SPN)
techniques.
๏‚ง Figure 2 shows the SPN
model describing the
ecosystem of a CPS with
intrusion detection and
response under capture,
impairment, and Byzantine
security attacks.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
III. System Model and Analysis
๏‚ง The underlying model of the SPN
model is a continuous-time semi-
Markov process with a state
representation of:
๏‚ง (๐‘ต๐’ˆ, ๐‘ต๐’ƒ, ๐‘ต๐’†, ๐’Š๐’Ž๐’‘๐’‚๐’Š๐’“๐’†๐’…, ๐’†๐’๐’†๐’“๐’ˆ๐’š):
๏‚ง ๐‘ต๐’ˆ: number of good nodes
๏‚ง ๐‘ต๐’ƒ: number of bad nodes
๏‚ง ๐‘ต๐’†: number of evicted nodes
๏‚ง ๐’Š๐’Ž๐’‘๐’‚๐’Š๐’“๐’†๐’… & ๐’†๐’๐’†๐’“๐’ˆ๐’š are
represented with a binary values:
๏‚ง 1 indicates impairment security
failure
๏‚ง 1 also indicates energy availability
๏‚ง 0 indicates energy exhaustion
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
III. System Model and Analysis
๏‚ง Places hold tokens, and tokens
represent nodes โ€“ initially all
๐‘ต nodes (128) are good nodes
located in ๐‘ต๐’ˆ.
๏‚ง Transitions model events:
๏‚ง TCP models good nodes
being compromised;
๏‚ง TFP models a good node
being falsely identified as
compromised;
๏‚ง TIDS models a bad node
being detected correctly.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
III. System Model and Analysis
๏‚ง Good nodes become
compromised due to capture
attacks with rate ๐€๐’„
๏‚ง This is modeled by associating
transition TCP with a rate of
๐€๐’„ โˆ— ๐‘ต๐’ˆ
๏‚ง Firing TCP will move tokens
one at a time from place ๐‘ต๐’ˆ to
๐‘ต๐’ƒ
๏‚ง Tokens in place ๐‘ต๐’ƒ represent
bad nodes performing
impairment attacks with
probability ๐’‘๐’‚
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
III. System Model and Analysis
๏‚ง ๐‘ต๐’† will be incremented by 1 when a bad
node is detected by the system IDS as
compromised, and ๐‘ต๐’ƒ will be
decremented by 1.
๏‚ง These events are modeled with the
associated transition TIDS, with (๐Ÿ โˆ’
๐œฌ๐Ÿ๐ง) accounting for the system IDS true
positive probability.
๏‚ง The system-level IDS can incorrectly
identify a good node as compromised.
๏‚ง This is modeled by moving a good node
in place ๐‘ต๐’ˆ to place ๐‘ต๐’† by firing the
transition TFP, with ๐œฌ๐Ÿ๐ฉ accounting for
the system IDS false positive
probability.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
III. System Model and Analysis
๏‚ง System energy is exhausted after time
๐‘ต๐ˆ๐ƒ๐’ โˆ— ๐‘ป๐ˆ๐ƒ๐’, where ๐‘ต๐ˆ๐ƒ๐’ is the max
number of intrusion detection intervals
the CPS can perform before exhaustion.
๏‚ง It can be estimated by considering the
amount of energy consumed in each ๐‘ป๐ˆ๐ƒ๐’
interval.
๏‚ง This event is modeled by placing a token
in place energy initially and firing
transition TENERGY.
๏‚ง When the exhaustion event occurs, the
token in place energy will be vanished.
๏‚ง The system enters an absorbing state and
all transitions are disabled.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
III. System Model and Analysis
๏‚ง When the number of bad nodes
(tokens in ๐‘ต๐’ƒ) is at least 1/3 of the
total number of nodes, the system fails
due to a Byzantine Failure.
๏‚ง Bad nodes in place ๐‘ต๐’ƒ perform attacks
with probability ๐’‘๐’‚, and cause
impairment to the system.
๏‚ง After an impairment-failure time period
is elapsed, heavy impairment will
result in a security failure.
๏‚ง This is modeled by firing transition
TIF, indicating the amount of time
needed by ๐’‘๐’‚๐‘ต๐’ƒ bad nodes to reach
this level of impairment, beyond which
the system cannot sustain the damage.
๏‚ง The value of ๐€๐ข๐Ÿ is system specific, and
is determined by domain experts.
๏‚ง A token is flown into place impaired
when such a security failure occurs.
๏‚ง Once a token is in place impaired, the
system enters an absorbing state.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
III. System Model and Analysis
๏‚ง We utilize the SPN model to analyze two design
tradeoffs:
๏‚ง Detection strength vs. energy consumption
๏‚ง As we increase the detection frequency (a smaller ๐‘ป๐ˆ๐ƒ๐’) or the
number of detectors (a larger m), the detection strength
increases, thus preventing the system from running into a
security failure.
๏‚ง However, this increases the rate at which energy is consumed,
thus resulting in a shorter system lifetime.
๏‚ง There is an optimal setting of ๐‘ป๐ˆ๐ƒ๐’ and m under which the
system MTTF is maximized, given the node capture rate and
attack model.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
III. System Model and Analysis
๏‚ง Detection response vs. attacker strength
๏‚ง As the random attack probability ๐’‘๐’‚ decreases, the attacker strength decreases, thus
lowering the probability of security failure due to impairment attacks.
๏‚ง However, compromised nodes become more hidden and difficult to detect because
they leave less evidence traceable, resulting in higher per-host false negative
probability ๐’‘๐Ÿ๐ง, and consequently a higher system-level false negative probability ๐œฌ๐Ÿ๐ง.
๏‚ง This increases the probability of security failure due to Byzantine attacks.
๏‚ง The system can respond to a detected instantaneous attacker strength, and adjust ๐‘ช๐‘ป
to trade a high per-host false positive probability ๐’‘๐Ÿ๐ฉ for a low per-host false negative
probability ๐’‘๐Ÿ๐ง, or vice versa, so as to minimize the probability of security failure.
๏‚ง Again, there exists an optimal setting of ๐‘ช๐‘ป as a function of attacker strength detected
at time ๐’• under which the system security failure probability is minimized.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
III. System Model and Analysis
๏‚ง Let ๐‘ณ be a binary random variable denoting the lifetime
of the system
๏‚ง If the system is alive at time ๐’•, it takes on the value of 1,
๏‚ง Otherwise it takes on the value 0.
๏‚ง The expected value of ๐‘ณ is the reliability of the system ๐‘น(๐’•) at
time ๐’•.
๏‚ง The MTTF (average lifetime) of the system we aim to
maximize:
๏‚ง ๐‘ด๐‘ป๐‘ป๐‘ญ = ๐ŸŽ
โˆž
๐‘น ๐’• ๐’…๐’•
๏‚ง The binary assignment to ๐‘ณ can be done by means of a
reward function assigning a reward ๐’“๐’Š of 0 (if the system
fails) or 1 (if the system is alive) to state ๐’Š and time ๐’•.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
III. System Model and Analysis
๏‚ง Once the binary value of 0 or 1 is assigned to all states
of the system, the reliability of the system ๐‘น(๐’•) is the
expected value of ๐‘ณ weighted on the probability that the
system stays at a particular state at time ๐’•, which we
can obtain easily from solving the SPN model.
๏‚ง The MTTF of the system is equal to the cumulative
reward to absorption, which can again be computed
easily using SPNP.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
IV. Parameterization
๏‚ง We consider the reference
CPS model operating in a 2x2
area with a network size (๐) of
128 nodes initially.
๏‚ง Initially, ๐’ โ‰ˆ
๐Ÿ๐Ÿ๐Ÿ–
๐Ÿ’
= ๐Ÿ‘๐Ÿ nodes.
๏‚ง This design is based on local
monitoring so it can be
generically applied to any
network structure.
๏‚ง A node uses a 35 Wh battery,
so its energy is ๐Ÿ๐Ÿ๐Ÿ”๐ŸŽ๐ŸŽ๐ŸŽ ๐‰.
๏‚ง System energy, ๐‘ฌ๐’, is therefore
๐Ÿ๐Ÿ๐Ÿ”๐ŸŽ๐ŸŽ๐ŸŽ ๐‰ โˆ— ๐Ÿ๐Ÿ๐Ÿ– = ๐Ÿ๐Ÿ”๐Ÿ๐Ÿ๐Ÿ–๐ŸŽ๐ŸŽ๐ŸŽ ๐‰
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
IV. Parameterization
A. System-Level IDS ๐œฌ๐Ÿ๐ง and ๐šธ๐Ÿ๐ฉ
๏‚ง We first parameterize the system IDS ๐œฌ๐Ÿ๐ง and ๐œฌ๐Ÿ๐ฉ:
๏‚ง The per-host IDS ๐’‘๐Ÿ๐ฉ and ๐’‘๐Ÿ๐ง as given input.
๏‚ง ๐œฌ๐Ÿ๐ง and ๐œฌ๐Ÿ๐ฉ highly depend on the attacker behavior.
๏‚ง A persistent attacker constantly performs slandering attacks;
๏‚ง Voting a bad node as a good node, and vice versa.
๏‚ง However, a random or an insidious attacker will only perform
slandering attacks randomly w/ ๐’‘๐’‚ to avoid detection.
๏‚ง We first differentiate the number of active bad nodes ๐‘ต๐’‚๐’ƒ from
the number of inactive bad nodes ๐‘ต๐’Š๐’ƒ, with ๐‘ต๐’‚๐’ƒ + ๐‘ต๐’Š๐’ƒ = ๐‘ต๐’ƒ,
such that at any time:
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
IV. Parameterization
๏‚ง An inactive bad node behaves as if it were a good node to
evade detection.
๏‚ง It casts votes the same way as a good node would.
๏‚ง For a persistent attacker, ๐’‘๐’‚ = ๐Ÿ.
๏‚ง For a random attacker, ๐’‘๐’‚ = ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž.
๏‚ง For an insidious attacker:
๏‚ง a compromised node stays dormant until a critical mass
of compromised nodes is gathered so that;
๏‚ง ๐’‘๐’‚ = ๐Ÿ when ๐‘ต๐’ƒ โ‰ฅ ๐‘ต๐‘ป๐’ƒ, and ๐’‘๐’‚ = ๐ŸŽ otherwise.
๏‚ง ๐‘ต๐‘ป๐’ƒ represents insidousness degree.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
IV. Parameterization
๏‚ง Here, ๐’Ž this is the number of detectors, and ๐’Ž๐’‚ is the majority of ๐’Ž.
๏‚ง The first summation aggregates the probability of a false negative stemming from selecting
a majority of active bad nodes.
๏‚ง The second summation aggregates the probability of a false negative stemming from
selecting a minority of ๐’Ž nodes from the set of active bad nodes which always cast
incorrect votes, coupled with selecting a sufficient number of nodes from the set of good
nodes and inactive bad nodes which make incorrect votes with probability ๐’‘๐Ÿ๐ง, resulting in
a majority of incorrect votes being cast.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
IV. Parameterization
B. Host IDS ๐’‘๐Ÿ๐ง and ๐’‘๐Ÿ๐ฉ
๏‚ง Next, we parameterize ๐’‘๐Ÿ๐ง and ๐’‘๐Ÿ๐ฉ for persistent,
random, and insidious attacks
๏‚ง The system, after testing and debugging, determines
a minimum threshold ๐‘ช๐‘ป such that ๐’‘๐Ÿ๐ง and ๐’‘๐Ÿ๐ฉ are
acceptable to system design.
๏‚ง Persistent Attacks
๏‚ง Let ๐’‘๐’‘๐Ÿ๐ง and ๐’‘๐’‘๐Ÿ๐ฉ be the false negative probability and the
false positive probability of the host IDS when ๐’‘๐’‚ = ๐Ÿ.
๏‚ง Let the minimum threshold ๐‘ช๐‘ป value set for the persistent
attack case be denoted by ๐‘ช๐’‘๐‘ป.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
IV. Parameterization
๏‚ง Random Attacks
๏‚ง Let ๐’‘๐’“๐Ÿ๐ง and ๐’‘๐’“๐Ÿ๐ฉ be the false negative probability and the false
positive probability of the host IDS when ๐’‘๐’‚ < ๐Ÿ.
๏‚ง The amount of evidence observable from a bad node would be
diminished proportionally to ๐’‘๐’‚.
๏‚ง Consequently, with the same minimum threshold ๐‘ช๐’‘๐‘ป being
used, the host false negative probability would increase.
๏‚ง The host false positive probability would remain the same, i.e.
๐’‘๐’“๐Ÿ๐ฉ = ๐’‘๐’‘๐Ÿ๐ฉ, because the attacker behavior does not affect false
positives, given the same minimum threshold ๐‘ช๐’‘๐‘ป being used.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
IV. Parameterization
๏‚ง Insidious Attacks
๏‚ง Let ๐’‘๐’Š๐Ÿ๐ง and ๐’‘๐’Š๐Ÿ๐ฉ be the false negative and false positive
probability of the host IDS under insidious attacks.
๏‚ง The false positive probability is not affected, so ๐’‘๐’Š๐Ÿ๐ฉ = ๐’‘๐’‘๐Ÿ๐ฉ.
๏‚ง Because insidious nodes stay dormant until a critical mass is
achieved:
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
IV. Parameterization
๏‚ง The ๐’‘๐Ÿ๐ง and ๐’‘๐Ÿ๐ฉ values obtained above for would be a
function of time as input to (10) for calculating system-
level IDS ๐šธ๐Ÿ๐ง and ๐šธ๐Ÿ๐ฉ dynamically.
๏‚ง We apply the statistical analysis described by (1) - (4) to
get the maximum likelihood estimates of ๐œท (with ๐œถ set
as 1) under each attacker behavior model, and then
utilize (5) and (6) to yield ๐’‘๐Ÿ๐ง and ๐’‘๐Ÿ๐ฉ.
๏‚ง The system minimum threshold ๐‘ช๐‘ป is set to ๐‘ช๐’‘๐‘ป = ๐ŸŽ. ๐Ÿ— to
yield ๐’‘๐’‘๐Ÿ๐ง = ๐Ÿ”. ๐Ÿ‘% and ๐’‘๐’‘๐Ÿ๐ฉ = ๐Ÿ•. ๐Ÿ‘%.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
IV. Parameterization
๏‚ง Table IV summarizes beta
values, and the resulting ๐’‘๐Ÿ๐ง
and ๐’‘๐Ÿ๐ฉ values under various
attacker behavior models.
๏‚ง The persistent attack model is
a special case in which ๐’‘๐’‚ = ๐Ÿ.
๏‚ง The insidious attack model is
another special case in which
๐’‘๐’‚ = ๐Ÿ during the โ€œall inโ€
attack period, and ๐’‘๐’‚ = ๐ŸŽ
during the dormant period.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
IV. Parameterization
C. Parameterizing ๐‘ช๐‘ป for Dynamic Intrusion Response
๏‚ง The parameterization of ๐’‘๐Ÿ๐ง and ๐’‘๐Ÿ๐ฉ above is based on a
constant ๐‘ช๐‘ป being used.
๏‚ง A dynamic IDS response design is to adjust ๐‘ช๐‘ป in
response to the attacker strength detected with the goal to
maximize the system lifetime.
๏‚ง The attacker strength of a node ๐‘– may be estimated
periodically by node ๐‘–โ€™s intrusion detectors.
๏‚ง That is, the compliance degree value of node ๐’Š, ๐‘ฟ๐’Š(๐’•),
based on observations collected during [๐’• โˆ’ ๐‘ป๐ˆ๐ƒ๐’, ๐’•], is
compared against the minimum threshold ๐‘ช๐’‘๐‘ป set for
persistent attacks.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
IV. Parameterization
๏‚ง If ๐‘ฟ๐’Š ๐’• < ๐‘ช๐’‘๐‘ป, then node ๐’Š is considered a bad node performing
active attacks at time ๐’•; otherwise, it is a good node.
๏‚ง This information is passed to the control module which
subsequently estimates ๐‘ต๐’‚๐’ƒ(๐’•), representing the attacker
strength at time ๐’•.
๏‚ง We want a simple yet efficient IDS response design that can
decrease ๐’‘๐Ÿ๐ง when the attacker strength is high, allowing quick
removal of active attackers to prevent impairment failure.
๏‚ง This goal is achieved by increasing the ๐‘ช๐‘ป value.
๏‚ง Conversely, when there is little attacker evidence detected, we
lower ๐‘ช๐‘ป to quickly decrease ๐’‘๐Ÿ๐ฉ and prevent Byzantine failure.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
IV. Parameterization
๏‚ง While there are many possible ways to dynamically control ๐‘ช๐‘ป, this
paper considers a linear one-to-one mapping function:
๏‚ง We set ๐‘ช๐‘ป to ๐‘ช๐’‘๐‘ป when ๐‘ต๐’‚๐’ƒ ๐’• detected at time ๐’• is 1, and linearly
increase/decrease ๐‘ช๐‘ป with increasing/decreasing attacker strength.
๏‚ง With ๐‘ช๐’‘๐‘ป = ๐ŸŽ. ๐Ÿ— in our CPS reference system, we set ๐œน๐‘ช๐‘ป
= ๐ŸŽ. ๐Ÿ“ and
parameterize ๐‘ช๐‘ป(๐’•) as:
๏‚ง When ๐‘ช๐‘ป is closer to 1, a node will more likely be considered as
compromised even if it wanders only for a small amount of time in
insecure states.
๏‚ง A large ๐‘ช๐‘ป induces a small ๐’‘๐Ÿ๐ง at the expense of a large ๐’‘๐Ÿ๐ฉ.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
IV. Parameterization
D. Energy
๏‚ง Lastly, we parameterize ๐‘ต๐ˆ๐ƒ๐’, the maximum number of intrusion
detection cycles the system can possibly perform before energy
exhaustion.
๏‚ง ๐‘ต๐ˆ๐ƒ๐’ = ๐‘ฌ๐’/๐‘ฌ๐ˆ๐ƒ๐’ (14), where ๐‘ฌ๐’ is the initial energy of the
reference CPS.
๏‚ง ๐‘ฌ๐ˆ๐ƒ๐’ is the energy consumed per ๐‘ป๐ˆ๐ƒ๐’ interval due to ranging,
sensing, and intrusion detection functions, calculated as:
๏‚ง The energy spent per node is multiplied with the node
population in the CPS to get the total energy spent by all nodes
per cycle.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
IV. Parameterization
๏‚ง ๐‘ฌ๐’“๐’‚๐’๐’ˆ๐’Š๐’๐’ˆ is calculated as:
๏‚ง A node spends ๐‘ฌ๐’• energy to transmit a CDMA
waveform.
๏‚ง Its ๐’ neighbors each spend ๐‘ฌ๐’‚ energy to transform it
into distance.
๏‚ง This operation is repeated for ๐œธ times for determining a
sequence of locations.
๏‚ง ๐‘ฌ๐’”๐’†๐’๐’”๐’Š๐’๐’ˆ is computed as:
๏‚ง A node spends ๐‘ฌ๐’” energy for sensing navigation and
multipath mitigation data, and ๐‘ฌ๐’‚ energy for analyzing
sensed data for each of its ๐’ neighbors.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
IV. Parameterization
๏‚ง ๐‘ฌ๐’…๐’†๐’•๐’†๐’„๐’•๐’Š๐’๐’ can be calculated by:
๏‚ง We consider the energy required to choose ๐‘š intrusion
detectors to evaluate a target node (the first term), and
the energy required for ๐’Ž intrusion detectors to vote
(the second term).
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
V. Numerical Data
A. Effect of Intrusion Detection
Strength
๏‚ง We first examine the effect of
intrusion detection strength
measured by the intrusion interval,
๐‘ป๐ˆ๐ƒ๐’, and the number of intrusion
detectors, ๐’Ž. (Persistent attacks
only)
๏‚ง Fig. 3 shows MTTF versus ๐‘ป๐ˆ๐ƒ๐’ as
the number of detectors ๐’Ž in the
system-level IDS varies over the
range of [3,11] in increments of 2.
๏‚ง There exists an optimal ๐‘ป๐ˆ๐ƒ๐’ value
at which the system lifetime is
maximized to best tradeoff energy
consumption versus intrusion
tolerance.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
V. Numerical Data
๏‚ง Initially, when ๐‘ป๐ˆ๐ƒ๐’ is too
small, the system performs
ranging, sensing, and intrusion
detection too frequently, and
quickly exhausts its energy,
resulting in a small lifetime.
๏‚ง As ๐‘ป๐ˆ๐ƒ๐’ increases, the system
saves more energy, and its
lifetime increases.
๏‚ง Finally, when ๐‘ป๐ˆ๐ƒ๐’ is too large,
it saves more energy but fails
to catch bad nodes often
enough.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
V. Numerical Data
๏‚ง Bad nodes through active
attacks can cause impairment
security failure.
๏‚ง When the system has 1/3 or
more bad nodes out of the
total population, a Byzantine
failure occurs.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
V. Numerical Data
๏‚ง We observe that the optimal
๐‘ป๐ˆ๐ƒ๐’ value at which the system
MTTF is maximized is sensitive
to the ๐’Ž value.
๏‚ง The general trend is that, as ๐’Ž
increases, the optimal ๐‘ป๐ˆ๐ƒ๐’
value decreases.
๏‚ง Here we observe that ๐’Ž = ๐Ÿ• is
optimal to yield the maximum
MTTF.
๏‚ง Using ๐’Ž = ๐Ÿ• can best balance
energy exhaustion failure
versus security failure for high
reliability.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
V. Numerical Data
๏‚ง Fig. 4 shows MTTF versus ๐‘ป๐ˆ๐ƒ๐’
as the compromising rate ๐€๐’„
varies over the range of once
per 4 hours to once per 24
hours.
๏‚ง This tests the sensitivity of
MTTF with respect to ๐€๐’„, with
๐’Ž fixed at five to isolate its
effect.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
V. Numerical Data
๏‚ง As ๐€๐’„ increases, MTTF
decreases because a more
compromised nodes will be
present in the system.
๏‚ง The optimal ๐‘ป๐ˆ๐ƒ๐’ decreases as
๐€๐’„ increases because more
compromised nodes exist, and
the system needs to execute
intrusion detection more
frequently to maximize MTTF.
๏‚ง Fig. 4 identifies the best ๐‘ป๐ˆ๐ƒ๐’ to
be used to maximize the lifetime
of the reference CPS to balance
energy exhaustion versus
security failure.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
V. Numerical Data
B. Effect of Attacker Behavior
๏‚ง We analyze the effect of various
attacker behavior models, including
persistent, random, and insidious
attacks.
๏‚ง The analysis conducted here is
based on static ๐‘ช๐‘ป.
๏‚ง Fig. 5 shows MTTF versus ๐‘ป๐ˆ๐ƒ๐’ with
varying ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž values.
๏‚ง The system MTTF is low when
๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž is small.
๏‚ง Most bad nodes are dormant and
remain undetected.
๏‚ง Eventually, the system suffers from
Byzantine failure quickly, leading to a
low MTTF.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
V. Numerical Data
๏‚ง As ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž increases from 0.025
to 0.2, the system MTTF
increases.
๏‚ง Bad nodes are more likely to be
detected and removed.
๏‚ง As ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž increases further,
however, the system MTTF
decreases again.
๏‚ง Due to larger number of impairment
attacks.
๏‚ง In the extreme case of ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž =
๐Ÿ, all bad nodes perform attacks,
and the system failure is mainly
caused by impairment.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
V. Numerical Data
๏‚ง The maximum MTTF occurs
when ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž = ๐ŸŽ. ๐Ÿ.
๏‚ง The probability of security
failure due to either type of
security attacks is
minimized.
๏‚ง This represents a balance of
impairment security failure
rate vs. Byzantine failure
rate dictated by the
parameter settings of the
reference CPS.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
V. Numerical Data
๏‚ง Fig. 6 compares the MTTF versus ๐‘ป๐ˆ๐ƒ๐’ of
the reference CPS under the three
attacker types.
๏‚ง MTTF of the CPS is the highest under
random attacks.
๏‚ง MTTF of the CPS under persistent
attacks is the second highest.
๏‚ง As expected, the CPS under insidious
attacks has the lowest MTTF.
๏‚ง Unlike persistent attacks which aim to
cause impairment failure, insidious
attacks while dormant can cause
Byzantine failure, and โ€œ
โ€all inโ€โ€œ
can also
cause impairment failure.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
V. Numerical Data
๏‚ง MTTF variation depends on the relative rate at
which impairment failure vs. Byzantine failure
occurs.
๏‚ง The former is dictated by ๐€๐ข๐Ÿ, and the latter is
dictated by how fast the Byzantine failure
condition is satisfied.
๏‚ง The MTTF difference between persistent
attacks and insidious attacks is relatively
significant is due to a large Byzantine failure
rate compared with the impairment failure rate.
๏‚ง However, the reference CPS under random
attacks can more effectively prevent either
Byzantine failure or impairment failure from
occurring by removing bad nodes as soon as
they perform attacks.
๏‚ง The system MTTF difference between random
versus persistent attacks again depends on the
relative rate at which impairment failure versus
Byzantine failure occurs.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
V. Numerical Data
C. Effect of Intrusion Response
๏‚ง We analyze the effect of intrusion
response (dynamic ๐‘ช๐‘ป) to attacker
strength detected at runtime on the
system MTTF.
๏‚ง Fig. 7 shows MTTF versus ๐‘ป๐ˆ๐ƒ๐’ under
the static ๐‘ช๐‘ป design and the dynamic ๐‘ช๐‘ป
design for the persistent attack case.
๏‚ง There is a significant gain in MTTF under
dynamic ๐‘ช๐‘ป over static ๐‘ช๐‘ป.
๏‚ง With persistent attacks, all bad nodes are
actively performing attacks, so increasing
๐‘ช๐‘ป to a high level to quickly removes bad
nodes to prevent impairment failure.
๏‚ง Also, the optimal ๐‘ป๐ˆ๐ƒ๐’ decreases for the
dynamic configuration.
๏‚ง This allows the IDS to remove bad nodes
from the system quickly.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
V. Numerical Data
๏‚ง Fig. 8 shows the MTTF vs. ๐‘ป๐ˆ๐ƒ๐’ under
the static ๐‘ช๐‘ป design and the dynamic ๐‘ช๐‘ป
design for the random attack case with
๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž = ๐ŸŽ. ๐Ÿ.
๏‚ง ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž = ๐ŸŽ. ๐Ÿ yields the highest MTTF
among all random attack cases in the
reference CPS system.
๏‚ง Again, dynamic ๐‘ช๐‘ป performs significantly
better than static ๐‘ช๐‘ป at the identified
optimal ๐‘ป๐ˆ๐ƒ๐’ value.
๏‚ง The optimal ๐‘ป๐ˆ๐ƒ๐’ value under dynamic ๐‘ช๐‘ป
design again is smaller than that under
static ๐‘ช๐‘ป design to quickly remove nodes
that perform active attacks.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
V. Numerical Data
๏‚ง Fig. 9 shows the MTTF versus ๐‘ป๐ˆ๐ƒ๐’
under the static ๐‘ช๐‘ป design and the
dynamic ๐‘ช๐‘ป design for the insidious
attack case.
๏‚ง The MTTF difference is relatively small
compared with persistent or random
attacks.
๏‚ง Bad nodes do not perform active attacks
until a critical mass is reached, so
dynamic ๐‘ช๐‘ป would set a lower ๐‘ช๐‘ป value
during the dormant period while rapidly
setting a higher ๐‘ช๐‘ป value during the
attack period.
๏‚ง Since the attack period is relatively short
compared with the dormant period, the
gain in MTTF isn't very significant.
๏‚ง Still, dynamic ๐‘ช๐‘ป performs better than
static ๐‘ช๐‘ป.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
V. Numerical Data
โ€ข As our ๐‘ช๐‘ป dynamic control function (12) adjusts
๐‘ช๐‘ป solely based on the attacker strength
detected regardless of the attacker type, we
conclude that the dynamic ๐‘ช๐‘ป design as a
response to attacker strength detected at
runtime can improve MTTF compared with the
static ๐‘ช๐‘ป design.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
VI. Conclusions and Future Work
๏‚ง This paper explores the development of a probability model to analyze the reliability of a
cyber physical system (CPS) containing malicious nodes exhibiting a range of attacker
behaviors and an intrusion detection and response system (IDRS) for detecting and
responding to malicious events at runtime.
๏‚ง For each attacker behavior, we identified the best detection strength (in terms of the
detection interval and the number of detectors), and the best response strength (in terms
of the per-host minimum compliance threshold for setting the false positive and negative
probabilities), under which the reliability of the system may be maximized.
๏‚ง There are several future research directions, including:
๏‚ง Investigating other intrusion detection criteria other than the current binary criterion used in the
paper;
๏‚ง Exploring other attack behavior models (e.g., an oracle attacker that can adjust the attacker
strength depending on the detection strength to maximize security failure), and investigating the
best dynamic response design to cope with such attacks.
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen
Itโ€™s finally over! Questions?
Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems
Robert Mitchell, Ing-Ray Chen

More Related Content

Similar to Mitchell-TR12-slide.pptx

574 501-507
574 501-507574 501-507
574 501-507
idescitation
ย 
M026075079
M026075079M026075079
M026075079ijceronline
ย 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEEGLOBALSOFTSTUDENTPROJECTS
ย 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
IEEEGLOBALSOFTSTUDENTSPROJECTS
ย 
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptxTOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
Nagarajusabhavath
ย 
A05510105
A05510105A05510105
A05510105
IOSR-JEN
ย 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
IJERA Editor
ย 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161IJERA Editor
ย 
Attack detection and prevention in the cyber
Attack detection and prevention in the cyberAttack detection and prevention in the cyber
Attack detection and prevention in the cyber
Jahangirnagar University
ย 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
IJCNCJournal
ย 
CYBER ATTACKS ON INTRUSION DETECTION SYSTEM
CYBER ATTACKS ON INTRUSION DETECTION SYSTEMCYBER ATTACKS ON INTRUSION DETECTION SYSTEM
CYBER ATTACKS ON INTRUSION DETECTION SYSTEM
ijistjournal
ย 
06558266
0655826606558266
06558266Vidya Sagar
ย 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
ย 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
IJERA Editor
ย 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
IRJET Journal
ย 
Self protection mechanism for wireless sensor networks
Self protection mechanism for wireless sensor networksSelf protection mechanism for wireless sensor networks
Self protection mechanism for wireless sensor networks
IJNSA Journal
ย 
SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS
SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS
SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS
IJNSA Journal
ย 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
IJNSA Journal
ย 

Similar to Mitchell-TR12-slide.pptx (20)

574 501-507
574 501-507574 501-507
574 501-507
ย 
M026075079
M026075079M026075079
M026075079
ย 
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS On false-data-injection-attacks-...
ย 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
ย 
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptxTOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
TOWARDS DETECTION CYBER ATTACKS PPT 1.pptx
ย 
A05510105
A05510105A05510105
A05510105
ย 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
ย 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
ย 
Attack detection and prevention in the cyber
Attack detection and prevention in the cyberAttack detection and prevention in the cyber
Attack detection and prevention in the cyber
ย 
244 251
244 251244 251
244 251
ย 
244 251
244 251244 251
244 251
ย 
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNNA NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
A NOVEL INTRUSION DETECTION MODEL FOR MOBILE AD-HOC NETWORKS USING CP-KNN
ย 
CYBER ATTACKS ON INTRUSION DETECTION SYSTEM
CYBER ATTACKS ON INTRUSION DETECTION SYSTEMCYBER ATTACKS ON INTRUSION DETECTION SYSTEM
CYBER ATTACKS ON INTRUSION DETECTION SYSTEM
ย 
06558266
0655826606558266
06558266
ย 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ย 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
ย 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
ย 
Self protection mechanism for wireless sensor networks
Self protection mechanism for wireless sensor networksSelf protection mechanism for wireless sensor networks
Self protection mechanism for wireless sensor networks
ย 
SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS
SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS
SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS
ย 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
ย 

Recently uploaded

ๅ“ช้‡ŒๅŠž็†(csuๆฏ•ไธš่ฏไนฆ)ๆŸฅๅฐ”ๆ–ฏ็‰นๅคงๅญฆๆฏ•ไธš่ฏ็ก•ๅฃซๅญฆๅŽ†ๅŽŸ็‰ˆไธ€ๆจกไธ€ๆ ท
ๅ“ช้‡ŒๅŠž็†(csuๆฏ•ไธš่ฏไนฆ)ๆŸฅๅฐ”ๆ–ฏ็‰นๅคงๅญฆๆฏ•ไธš่ฏ็ก•ๅฃซๅญฆๅŽ†ๅŽŸ็‰ˆไธ€ๆจกไธ€ๆ ทๅ“ช้‡ŒๅŠž็†(csuๆฏ•ไธš่ฏไนฆ)ๆŸฅๅฐ”ๆ–ฏ็‰นๅคงๅญฆๆฏ•ไธš่ฏ็ก•ๅฃซๅญฆๅŽ†ๅŽŸ็‰ˆไธ€ๆจกไธ€ๆ ท
ๅ“ช้‡ŒๅŠž็†(csuๆฏ•ไธš่ฏไนฆ)ๆŸฅๅฐ”ๆ–ฏ็‰นๅคงๅญฆๆฏ•ไธš่ฏ็ก•ๅฃซๅญฆๅŽ†ๅŽŸ็‰ˆไธ€ๆจกไธ€ๆ ท
insn4465
ย 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
ย 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
ย 
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(UMichๆฏ•ไธš่ฏ)ๅฏ†ๆญ‡ๆ นๅคงๅญฆ|ๅฎ‰ๅจœๅ กๅˆ†ๆ กๆฏ•ไธš่ฏๆˆ็ปฉๅ•ไธ“ไธšๅŠž็†
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(UMichๆฏ•ไธš่ฏ)ๅฏ†ๆญ‡ๆ นๅคงๅญฆ|ๅฎ‰ๅจœๅ กๅˆ†ๆ กๆฏ•ไธš่ฏๆˆ็ปฉๅ•ไธ“ไธšๅŠž็†ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(UMichๆฏ•ไธš่ฏ)ๅฏ†ๆญ‡ๆ นๅคงๅญฆ|ๅฎ‰ๅจœๅ กๅˆ†ๆ กๆฏ•ไธš่ฏๆˆ็ปฉๅ•ไธ“ไธšๅŠž็†
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(UMichๆฏ•ไธš่ฏ)ๅฏ†ๆญ‡ๆ นๅคงๅญฆ|ๅฎ‰ๅจœๅ กๅˆ†ๆ กๆฏ•ไธš่ฏๆˆ็ปฉๅ•ไธ“ไธšๅŠž็†
zwunae
ย 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
ย 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
ย 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
ย 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
ย 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
ย 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
ย 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
ย 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
ย 
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(IITๆฏ•ไธš่ฏ)ไผŠๅˆฉ่ฏบไผŠ็†ๅทฅๅคงๅญฆๆฏ•ไธš่ฏๆˆ็ปฉๅ•ไธ“ไธšๅŠž็†
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(IITๆฏ•ไธš่ฏ)ไผŠๅˆฉ่ฏบไผŠ็†ๅทฅๅคงๅญฆๆฏ•ไธš่ฏๆˆ็ปฉๅ•ไธ“ไธšๅŠž็†ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(IITๆฏ•ไธš่ฏ)ไผŠๅˆฉ่ฏบไผŠ็†ๅทฅๅคงๅญฆๆฏ•ไธš่ฏๆˆ็ปฉๅ•ไธ“ไธšๅŠž็†
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(IITๆฏ•ไธš่ฏ)ไผŠๅˆฉ่ฏบไผŠ็†ๅทฅๅคงๅญฆๆฏ•ไธš่ฏๆˆ็ปฉๅ•ไธ“ไธšๅŠž็†
zwunae
ย 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
ย 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
ย 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
ย 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
ย 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
ย 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
ย 
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(SFUๆฏ•ไธš่ฏ)่ฅฟ่’™่ฒ่ŽŽๅคงๅญฆๆฏ•ไธš่ฏๆˆ็ปฉๅ•ๅฆ‚ไฝ•ๅŠž็†
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(SFUๆฏ•ไธš่ฏ)่ฅฟ่’™่ฒ่ŽŽๅคงๅญฆๆฏ•ไธš่ฏๆˆ็ปฉๅ•ๅฆ‚ไฝ•ๅŠž็†ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(SFUๆฏ•ไธš่ฏ)่ฅฟ่’™่ฒ่ŽŽๅคงๅญฆๆฏ•ไธš่ฏๆˆ็ปฉๅ•ๅฆ‚ไฝ•ๅŠž็†
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(SFUๆฏ•ไธš่ฏ)่ฅฟ่’™่ฒ่ŽŽๅคงๅญฆๆฏ•ไธš่ฏๆˆ็ปฉๅ•ๅฆ‚ไฝ•ๅŠž็†
bakpo1
ย 

Recently uploaded (20)

ๅ“ช้‡ŒๅŠž็†(csuๆฏ•ไธš่ฏไนฆ)ๆŸฅๅฐ”ๆ–ฏ็‰นๅคงๅญฆๆฏ•ไธš่ฏ็ก•ๅฃซๅญฆๅŽ†ๅŽŸ็‰ˆไธ€ๆจกไธ€ๆ ท
ๅ“ช้‡ŒๅŠž็†(csuๆฏ•ไธš่ฏไนฆ)ๆŸฅๅฐ”ๆ–ฏ็‰นๅคงๅญฆๆฏ•ไธš่ฏ็ก•ๅฃซๅญฆๅŽ†ๅŽŸ็‰ˆไธ€ๆจกไธ€ๆ ทๅ“ช้‡ŒๅŠž็†(csuๆฏ•ไธš่ฏไนฆ)ๆŸฅๅฐ”ๆ–ฏ็‰นๅคงๅญฆๆฏ•ไธš่ฏ็ก•ๅฃซๅญฆๅŽ†ๅŽŸ็‰ˆไธ€ๆจกไธ€ๆ ท
ๅ“ช้‡ŒๅŠž็†(csuๆฏ•ไธš่ฏไนฆ)ๆŸฅๅฐ”ๆ–ฏ็‰นๅคงๅญฆๆฏ•ไธš่ฏ็ก•ๅฃซๅญฆๅŽ†ๅŽŸ็‰ˆไธ€ๆจกไธ€ๆ ท
ย 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
ย 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
ย 
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(UMichๆฏ•ไธš่ฏ)ๅฏ†ๆญ‡ๆ นๅคงๅญฆ|ๅฎ‰ๅจœๅ กๅˆ†ๆ กๆฏ•ไธš่ฏๆˆ็ปฉๅ•ไธ“ไธšๅŠž็†
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(UMichๆฏ•ไธš่ฏ)ๅฏ†ๆญ‡ๆ นๅคงๅญฆ|ๅฎ‰ๅจœๅ กๅˆ†ๆ กๆฏ•ไธš่ฏๆˆ็ปฉๅ•ไธ“ไธšๅŠž็†ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(UMichๆฏ•ไธš่ฏ)ๅฏ†ๆญ‡ๆ นๅคงๅญฆ|ๅฎ‰ๅจœๅ กๅˆ†ๆ กๆฏ•ไธš่ฏๆˆ็ปฉๅ•ไธ“ไธšๅŠž็†
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(UMichๆฏ•ไธš่ฏ)ๅฏ†ๆญ‡ๆ นๅคงๅญฆ|ๅฎ‰ๅจœๅ กๅˆ†ๆ กๆฏ•ไธš่ฏๆˆ็ปฉๅ•ไธ“ไธšๅŠž็†
ย 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
ย 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
ย 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
ย 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
ย 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
ย 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
ย 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
ย 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
ย 
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(IITๆฏ•ไธš่ฏ)ไผŠๅˆฉ่ฏบไผŠ็†ๅทฅๅคงๅญฆๆฏ•ไธš่ฏๆˆ็ปฉๅ•ไธ“ไธšๅŠž็†
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(IITๆฏ•ไธš่ฏ)ไผŠๅˆฉ่ฏบไผŠ็†ๅทฅๅคงๅญฆๆฏ•ไธš่ฏๆˆ็ปฉๅ•ไธ“ไธšๅŠž็†ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(IITๆฏ•ไธš่ฏ)ไผŠๅˆฉ่ฏบไผŠ็†ๅทฅๅคงๅญฆๆฏ•ไธš่ฏๆˆ็ปฉๅ•ไธ“ไธšๅŠž็†
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(IITๆฏ•ไธš่ฏ)ไผŠๅˆฉ่ฏบไผŠ็†ๅทฅๅคงๅญฆๆฏ•ไธš่ฏๆˆ็ปฉๅ•ไธ“ไธšๅŠž็†
ย 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
ย 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
ย 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
ย 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ย 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
ย 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
ย 
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(SFUๆฏ•ไธš่ฏ)่ฅฟ่’™่ฒ่ŽŽๅคงๅญฆๆฏ•ไธš่ฏๆˆ็ปฉๅ•ๅฆ‚ไฝ•ๅŠž็†
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(SFUๆฏ•ไธš่ฏ)่ฅฟ่’™่ฒ่ŽŽๅคงๅญฆๆฏ•ไธš่ฏๆˆ็ปฉๅ•ๅฆ‚ไฝ•ๅŠž็†ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(SFUๆฏ•ไธš่ฏ)่ฅฟ่’™่ฒ่ŽŽๅคงๅญฆๆฏ•ไธš่ฏๆˆ็ปฉๅ•ๅฆ‚ไฝ•ๅŠž็†
ไธ€ๆฏ”ไธ€ๅŽŸ็‰ˆ(SFUๆฏ•ไธš่ฏ)่ฅฟ่’™่ฒ่ŽŽๅคงๅญฆๆฏ•ไธš่ฏๆˆ็ปฉๅ•ๅฆ‚ไฝ•ๅŠž็†
ย 

Mitchell-TR12-slide.pptx

  • 1. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen Paper Presentation by Michael Matarazzo (mfm11@vt.edu) Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 2. Overview I. Introduction II. Reference Model III.System Model and Analysis IV.Parameterization Process V. Numerical Data with Interpretations VI.Conclusions and Future Work Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 3. I. Introduction ๏‚ง Cyber Physical System (CPS) ๏‚ง A system using sensors, actuators, control units, and other physical objects to control and protect a physical infrastructure. ๏‚ง Failure can have severe consequences, thus it is very important to protect it from malicious attacks. ๏‚ง Reliability of CPS ๏‚ง This paper explores the reliability of a CPS designed to sustain malicious attacks over time without energy replenishment. ๏‚ง A CPS usually operates in some hostile environment where energy replenishment may not be possible and nodes may be compromised. ๏‚ง To prolong the system lifetime, an Intrusion Detection and Response System (IDRS) must effectively detect malicious nodes without unnecessarily wasting energy. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 4. I. Introduction ๏‚ง Intrusion Detection System (IDS) Designs ๏‚ง Signature Based ๏‚ง Oman and Phillips [22] study an IDS for CPSs that tests an automated transform from XML profile to Snort signature in an electricity distribution laboratory. ๏‚ง Anomaly Based ๏‚ง Barbosa and Pras [2] study an IDS for CPSs that tests state machine and Markov chain approaches to traffic analysis on a water distribution system based on a comprehensive vulnerability assessment. ๏‚ง Specification Based ๏‚ง Cheung, et al. [12] study a specification based IDS that uses PVS to transform protocol, communication patterns, and service availability specifications into a format compatible with EMERALD. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 5. I. Introduction ๏‚ง This paper uses a Specification based approach with the following features: ๏‚ง A specification is automatically mapped into a state machine consisting of good and bad states. ๏‚ง For intrusion detection, nodeโ€™s deviation from good states is measured at runtime. ๏‚ง Specification-based techniques are applied to host- level intrusion detection only. ๏‚ง System-level intrusion detection is devised based on multitrust to yield low false alarm probability. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 6. I. Introduction ๏‚ง Addressing Response ๏‚ง Unlike intrusion detection, little work has been done on the response aspect of IDRS. ๏‚ง This design addresses both intrusion detection and response issues, with the goal to maximize the CPS lifetime. ๏‚ง Methodology ๏‚ง We use a probability model-based analysis to assess the reliability of a CPS w/ IDRS. ๏‚ง A variety of attacker behaviors are considered, including persistent, random, and insidious. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 7. I. Introduction ๏‚ง To achieve high reliability, we identify the best design settings of the detection strength and response strength to best balance energy conservation vs. intrusion tolerance given a set of parameter values characterizing the operational environment and network conditions. ๏‚ง Parameterization of the model using the properties of the IDS system is one major contribution of the paper. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 8. II. Reference Model A. Reference CPS Model ๏‚ง Comprised of 128 sensor-carried mobile nodes, each of which ranges its neighbors periodically, uses its sensor to measure any detectable phenomena nearby, and transmits a CDMA waveform. ๏‚ง Neighbors receiving the waveform transform the timing of the PN code and RF carrier into distance. ๏‚ง Each node performs sensing and reporting functions to provide information to upper layer control devices and utilizes its ranging function for node localization and intrusion detection. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 9. II. Reference Model ๏‚ง It is a special case of a single-enclave system with homogeneous nodes. ๏‚ง The IDS functionality is distributed to all nodes in the system for intrusion and fault tolerance. ๏‚ง On top of the mobile nodes sits a control node responsible for setting system parameters in response to dynamically changing conditions, such as changes of attacker strength. ๏‚ง The control module is assumed to be fault and intrusion free through security and hardware protection mechanisms against capture attacks and hardware failure. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 10. II. Reference Model ๏‚ง Fig. 1 depicts the reference CPS: ๏‚ง The mobile nodes (RTUs) are capable of sensing physical environments as well as actuating and controlling the underlying physical objects in the CPS. ๏‚ง On top is a control unit (MTU) which receives sensing data from the nodes and determines actions to be performed them. ๏‚ง MTU sends actuator commands to trigger the actuating devices of the mobile nodes. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 11. II. Reference Model ๏‚ง Real World Applications of Reference CPS ๏‚ง Disaster Recovery โ€“ a group of mobile nodes with motion/video sensing and actuating capabilities cooperating under the control of a disaster corrective control unit to protect and recover physical objects. ๏‚ง Military Patrol โ€“ a group of mobile patrol nodes equipped with motion sensing and fighting capabilities cooperating under the control of a control unit to protect and control physical objects. ๏‚ง Unmanned aircraft systems - a group of UAVs equipped with sensing and fighting capabilities cooperating under the control of a remote control unit to control and protect physical objects. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 12. II. Reference Model ๏‚ง MTU (control unit) contains the control logic, provides management services, and implements the broad strategic control functions. ๏‚ง This reference CPS is highly mobile (nodes are mobile) and safety-critical, using ad-hoc networking with bidirectional flows. ๏‚ง Host IDS design is based on local monitoring. ๏‚ง System-level IDS design is based on the voting of neighbor monitoring nodes. ๏‚ง These techniques can be generically applied to any network structure used in a CPS. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 13. II. Reference Model B. Security Failure ๏‚ง Byzantine Fault Model ๏‚ง The system fails if 1/3 or more of the nodes are compromised. ๏‚ง Represents the situation in which the control unit is unable to obtain any sensor reading consensus. ๏‚ง Impairment Failure ๏‚ง The system fails because an undetected compromised node performing active attacks has impaired the functionality of the system. ๏‚ง This is modeled by defining an impairment failure attack period by a compromised node beyond which the system cannot sustain the damage. ๏‚ง Represents the situation when the system is severely impaired due to impairment by an undetected bad node (especially an actuator) over an impairment failure period. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 14. II. Reference Model C. Attack Model ๏‚ง We consider capture attacks which turn a good node into a bad insider node: ๏‚ง At the sensor-actuator layer of the CPS architecture, a bad node can perform data spoofing attacks and bad command execution attacks. ๏‚ง At the networking layer, a bad node can perform various communication attacks such as selective forwarding, packet dropping, packet flooding, etc. to disrupt the systemโ€™s packet routing capability. ๏‚ง At the control layer, a bad node can perform control-level attacks including aggregated data and command spoofing attacks. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 15. II. Reference Model ๏‚ง Our primary interest is on capture attacks of sensor-actuator nodes: ๏‚ง Persistent attacker - performs attacks whenever it has a chance, with ๐ฉ๐ซ๐จ๐›๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ = ๐Ÿ and a primary objective to cause impairment failure. ๏‚ง Random attacker - performs attacks randomly with ๐ฉ๐ซ๐จ๐›๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ = ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž and a primary objective of evading detection. ๏‚ง It may take a longer time to cause impairment failure. ๏‚ง It may increase the probability of a Byzantine security failure. ๏‚ง Insidious attacker - is hidden all the time to evade detection until a critical mass of compromised nodes is reached. ๏‚ง It then performs an โ€œall inโ€ attack. ๏‚ง The primary objective is to maximize the security failure probability caused by either impairment or Byzantine failure. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 16. II. Reference Model D. Host Intrusion Detection (two core techniques): ๏‚ง Behavior rule specification ๏‚ง To specify the behavior of an entity (sensor or actuator) by a set of rules from which a state machine is automatically derived. ๏‚ง Then, node misbehavior can be assessed by observing the behaviors of the node against the state machine (or behavior rules). ๏‚ง Vector similarity specification ๏‚ง To compare similarity of a sequence of sensor readings, commands, or votes among entities performing the same set of functions. ๏‚ง A state machine is also automatically derived from which a similarity test is performed to detect outliers. ๏‚ง The states derived in the state machine would be labeled as secure vs. insecure. ๏‚ง A monitoring node then applies snooping and overhearing techniques observing the percentage of time a neighbor node is in secure states over the intrusion detection interval ๐‘ป๐‘ฐ๐‘ซ๐‘บ. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 17. II. Reference Model ๏‚ง A longer time in secure states indicates greater specification compliance, while a shorter time indicates less โ€“ if ๐‘ฟ๐’Š falls below ๐‘ช๐‘ป, node ๐’Š is considered compromised. ๏‚ง Application of these two host IDS techniques to reference CPS: ๏‚ง A monitoring node periodically determines a sequence of locations of a sensor-carried mobile node within radio range and detects if the location sequence (corresponding to the state sequence) deviates from the expected location sequence. ๏‚ง A monitoring node periodically collects votes from neighbor nodes and detects dissimilarity of vote sequences for outlier detection. ๏‚ง Measurement of compliance degree is not perfect and can be affected by noise and unreliable wireless communication in the CPS. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 18. ๏‚ง We model the compliance degree by a random variable ๐‘ฟ with ๐‘ฎ โˆ™ = ๐‘ฉ๐’†๐’•๐’‚(๐œถ, ๐œท) distribution, with value 0 indicating that the output is totally unacceptable (zero compliance), and 1 indicating the output is totally acceptable (perfect compliance) ๏‚ง ๐‘ฎ ๐’‚ , ๐ŸŽ โ‰ค ๐’‚ โ‰ค ๐Ÿ, is given by: ๏‚ง And the expected value of ๐‘ฟ is given by: ๏‚ง The ๐œถ and ๐œท parameters are to be estimated based on the method of maximum likelihood by using the compliance degree history collected during the systemโ€™s testing phase. ๏‚ง The system is tested with its anticipated attacker event profile and the compliance degree is assessed using the specification-based host IDS described above. II. Reference Model Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 19. II. Reference Model ๏‚ง A nodeโ€™s anticipated event profile describes a nodeโ€™s behaviors, and predicts the next state the node will be entering upon an event occurrence. ๏‚ง A persistent attacker will likely go to another bad state because it performs attacks continuously. ๏‚ง A random attacker will likely go to a bad state in accordance to its random attack probability. ๏‚ง A good node on the other hand will likely go to another good state because it complies with its behavior rules, unless the detection of its behaviors is hindered by noise or wireless channel error. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 20. II. Reference Model ๏‚ง The compliance degree history is the realization of a sequence of random variables (๐’„๐Ÿ, ๐’„๐Ÿ, โ€ฆ , ๐’„๐’) and ๐’ is the total number of compliance degree outputs observed. ๏‚ง The maximum likelihood estimates of ๐œถ and ๐œท are obtained by numerically solving: ๏‚ง where ๏‚ง A simpler model involves a single parameter ๐‘ฉ๐’†๐’•๐’‚(๐œท) distribution with ๐œถ = ๐Ÿ. ๏‚ง The density is ๐œท(๐Ÿ โˆ’ ๐’™)๐œทโˆ’๐Ÿ for ๐ŸŽ โ‰ค ๐’™ โ‰ค ๐Ÿ, and 0 otherwise. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 21. II. Reference Model ๏‚ง Host intrusion detection is characterized by: ๏‚ง ๐’‘๐Ÿ๐ง (probability of per-host IDS false negative) ๏‚ง ๐‘๐Ÿ๐ฉ (probability of per-host IDS false positive) ๏‚ง We consider a System minimum compliance threshold (๐‘ช๐‘ป) criterion: ๏‚ง If ๐‘ฟ๐’ƒ (compliance degree of a bad node) > ๐‘ช๐‘ป, then there is a false negative. ๏‚ง Assuming ๐‘ฟ๐‘ is modeled by ๐‘ฎ โˆ™ = ๐‘ฉ๐’†๐’•๐’‚(๐œถ, ๐œท) distribution: ๏‚ง ๐’‘๐Ÿ๐ง = ๐๐ซ ๐‘ฟ๐’ƒ > ๐‘ช๐‘ป = ๐Ÿ โˆ’ ๐‘ฎ(๐‘ช๐‘ป) ๏‚ง If ๐‘ฟ๐’ˆ (compliance degree of a good node) < ๐‘ช๐‘‡, then there is a false positive. ๏‚ง Assuming ๐‘ฟ๐’ˆ is modeled by the same distribution: ๏‚ง ๐’‘๐Ÿ๐ฉ = ๐๐ซ ๐‘ฟ๐’ˆ โ‰ค ๐‘ช๐‘ป = ๐‘ฎ(๐‘ช๐‘ป) Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 22. II. Reference Model ๏‚ง These two probabilities are largely affected by the setting of ๐‘ช๐‘ป; ๏‚ง A large ๐‘ช๐‘ป induces a small false negative probability at the expense of a large false positive probability, and vice versa; ๏‚ง A proper setting of ๐‘ช๐‘ป in response to attacker strength detected at runtime helps maximize the system lifetime. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 23. II. Reference Model E. System Intrusion Detection ๏‚ง Based on majority voting of host IDS results to cope with incomplete and uncertain information available to nodes; ๏‚ง Involves the selection of m detectors as well as the invocation interval ๐‘ป๐‘ฐ๐‘ซ๐‘บ to best balance energy conservation vs. intrusion tolerance for achieving high reliability. ๏‚ง Each node periodically exchanges its routing information, location, and identifier with its neighbor nodes, and a coordinator is selected randomly among neighbors so that the adversaries will not have specific targets. ๏‚ง Randomness is added to this selection process by introducing a keyed hash function. ๏‚ง The node with the smallest returned hash value would then become the coordinator. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 24. II. Reference Model ๏‚ง Because the candidate nodes know each otherโ€™s identifier and location, they can, without trading information, execute the hash function to determine which node would be the coordinator. ๏‚ง The coordinator selects m detectors randomly (including itself) and lets all detectors know each othersโ€™ identities so that each voter can send its yes or no vote to other detectors. ๏‚ง At the end of the voting process, all detectors will know the same result. ๏‚ง The node is diagnosed as good, or as bad based on the majority vote. ๏‚ง The system IDS is characterized by ๐œฌ๐Ÿ๐ง and ๐œฌ๐Ÿ๐ฉ, which are two false alarm probabilities derived in the paper. ๏‚ง They are not constant but vary dynamically, depending on the percentage of bad nodes in the system when majority voting is performed. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 25. II. Reference Model F. Response ๏‚ง Our IDRS reacts to malicious events at runtime by adjusting ๐‘ช๐‘ป. ๏‚ง Upon sensing increasing attacker strength, it can increase ๐‘ช๐‘ป with the objective to prevent impairment security failure. ๏‚ง Results in a smaller false negative probability, reducing the number of bad nodes in the system, and decreasing the probability of impairment security failure. ๏‚ง However, it could reduce the number of good nodes in the system due to a resulting larger false positive probability, thus increasing the probability of a Byzantine failure. ๏‚ง To compensate, the IDRS increases the audit rate or number of detectors to reduce the false positive probability at the expense of more energy consumption. ๏‚ง The relationship between the minimum compliance threshold ๐‘ช๐‘ป set versus ๐’‘๐Ÿ๐ง and ๐’‘๐Ÿ๐ฉ must be determined at static time so the system can adjust ๐‘ช๐‘ป dynamically in response to malicious events detected at runtime. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 26. III. System Model and Analysis Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 27. III. System Model and Analysis Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 28. III. System Model and Analysis ๏‚ง The theoretical model utilizes stochastic Petri net (SPN) techniques. ๏‚ง Figure 2 shows the SPN model describing the ecosystem of a CPS with intrusion detection and response under capture, impairment, and Byzantine security attacks. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 29. III. System Model and Analysis ๏‚ง The underlying model of the SPN model is a continuous-time semi- Markov process with a state representation of: ๏‚ง (๐‘ต๐’ˆ, ๐‘ต๐’ƒ, ๐‘ต๐’†, ๐’Š๐’Ž๐’‘๐’‚๐’Š๐’“๐’†๐’…, ๐’†๐’๐’†๐’“๐’ˆ๐’š): ๏‚ง ๐‘ต๐’ˆ: number of good nodes ๏‚ง ๐‘ต๐’ƒ: number of bad nodes ๏‚ง ๐‘ต๐’†: number of evicted nodes ๏‚ง ๐’Š๐’Ž๐’‘๐’‚๐’Š๐’“๐’†๐’… & ๐’†๐’๐’†๐’“๐’ˆ๐’š are represented with a binary values: ๏‚ง 1 indicates impairment security failure ๏‚ง 1 also indicates energy availability ๏‚ง 0 indicates energy exhaustion Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 30. III. System Model and Analysis ๏‚ง Places hold tokens, and tokens represent nodes โ€“ initially all ๐‘ต nodes (128) are good nodes located in ๐‘ต๐’ˆ. ๏‚ง Transitions model events: ๏‚ง TCP models good nodes being compromised; ๏‚ง TFP models a good node being falsely identified as compromised; ๏‚ง TIDS models a bad node being detected correctly. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 31. III. System Model and Analysis ๏‚ง Good nodes become compromised due to capture attacks with rate ๐€๐’„ ๏‚ง This is modeled by associating transition TCP with a rate of ๐€๐’„ โˆ— ๐‘ต๐’ˆ ๏‚ง Firing TCP will move tokens one at a time from place ๐‘ต๐’ˆ to ๐‘ต๐’ƒ ๏‚ง Tokens in place ๐‘ต๐’ƒ represent bad nodes performing impairment attacks with probability ๐’‘๐’‚ Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 32. III. System Model and Analysis ๏‚ง ๐‘ต๐’† will be incremented by 1 when a bad node is detected by the system IDS as compromised, and ๐‘ต๐’ƒ will be decremented by 1. ๏‚ง These events are modeled with the associated transition TIDS, with (๐Ÿ โˆ’ ๐œฌ๐Ÿ๐ง) accounting for the system IDS true positive probability. ๏‚ง The system-level IDS can incorrectly identify a good node as compromised. ๏‚ง This is modeled by moving a good node in place ๐‘ต๐’ˆ to place ๐‘ต๐’† by firing the transition TFP, with ๐œฌ๐Ÿ๐ฉ accounting for the system IDS false positive probability. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 33. III. System Model and Analysis ๏‚ง System energy is exhausted after time ๐‘ต๐ˆ๐ƒ๐’ โˆ— ๐‘ป๐ˆ๐ƒ๐’, where ๐‘ต๐ˆ๐ƒ๐’ is the max number of intrusion detection intervals the CPS can perform before exhaustion. ๏‚ง It can be estimated by considering the amount of energy consumed in each ๐‘ป๐ˆ๐ƒ๐’ interval. ๏‚ง This event is modeled by placing a token in place energy initially and firing transition TENERGY. ๏‚ง When the exhaustion event occurs, the token in place energy will be vanished. ๏‚ง The system enters an absorbing state and all transitions are disabled. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 34. III. System Model and Analysis ๏‚ง When the number of bad nodes (tokens in ๐‘ต๐’ƒ) is at least 1/3 of the total number of nodes, the system fails due to a Byzantine Failure. ๏‚ง Bad nodes in place ๐‘ต๐’ƒ perform attacks with probability ๐’‘๐’‚, and cause impairment to the system. ๏‚ง After an impairment-failure time period is elapsed, heavy impairment will result in a security failure. ๏‚ง This is modeled by firing transition TIF, indicating the amount of time needed by ๐’‘๐’‚๐‘ต๐’ƒ bad nodes to reach this level of impairment, beyond which the system cannot sustain the damage. ๏‚ง The value of ๐€๐ข๐Ÿ is system specific, and is determined by domain experts. ๏‚ง A token is flown into place impaired when such a security failure occurs. ๏‚ง Once a token is in place impaired, the system enters an absorbing state. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 35. III. System Model and Analysis ๏‚ง We utilize the SPN model to analyze two design tradeoffs: ๏‚ง Detection strength vs. energy consumption ๏‚ง As we increase the detection frequency (a smaller ๐‘ป๐ˆ๐ƒ๐’) or the number of detectors (a larger m), the detection strength increases, thus preventing the system from running into a security failure. ๏‚ง However, this increases the rate at which energy is consumed, thus resulting in a shorter system lifetime. ๏‚ง There is an optimal setting of ๐‘ป๐ˆ๐ƒ๐’ and m under which the system MTTF is maximized, given the node capture rate and attack model. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 36. III. System Model and Analysis ๏‚ง Detection response vs. attacker strength ๏‚ง As the random attack probability ๐’‘๐’‚ decreases, the attacker strength decreases, thus lowering the probability of security failure due to impairment attacks. ๏‚ง However, compromised nodes become more hidden and difficult to detect because they leave less evidence traceable, resulting in higher per-host false negative probability ๐’‘๐Ÿ๐ง, and consequently a higher system-level false negative probability ๐œฌ๐Ÿ๐ง. ๏‚ง This increases the probability of security failure due to Byzantine attacks. ๏‚ง The system can respond to a detected instantaneous attacker strength, and adjust ๐‘ช๐‘ป to trade a high per-host false positive probability ๐’‘๐Ÿ๐ฉ for a low per-host false negative probability ๐’‘๐Ÿ๐ง, or vice versa, so as to minimize the probability of security failure. ๏‚ง Again, there exists an optimal setting of ๐‘ช๐‘ป as a function of attacker strength detected at time ๐’• under which the system security failure probability is minimized. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 37. III. System Model and Analysis ๏‚ง Let ๐‘ณ be a binary random variable denoting the lifetime of the system ๏‚ง If the system is alive at time ๐’•, it takes on the value of 1, ๏‚ง Otherwise it takes on the value 0. ๏‚ง The expected value of ๐‘ณ is the reliability of the system ๐‘น(๐’•) at time ๐’•. ๏‚ง The MTTF (average lifetime) of the system we aim to maximize: ๏‚ง ๐‘ด๐‘ป๐‘ป๐‘ญ = ๐ŸŽ โˆž ๐‘น ๐’• ๐’…๐’• ๏‚ง The binary assignment to ๐‘ณ can be done by means of a reward function assigning a reward ๐’“๐’Š of 0 (if the system fails) or 1 (if the system is alive) to state ๐’Š and time ๐’•. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 38. III. System Model and Analysis ๏‚ง Once the binary value of 0 or 1 is assigned to all states of the system, the reliability of the system ๐‘น(๐’•) is the expected value of ๐‘ณ weighted on the probability that the system stays at a particular state at time ๐’•, which we can obtain easily from solving the SPN model. ๏‚ง The MTTF of the system is equal to the cumulative reward to absorption, which can again be computed easily using SPNP. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 39. IV. Parameterization ๏‚ง We consider the reference CPS model operating in a 2x2 area with a network size (๐) of 128 nodes initially. ๏‚ง Initially, ๐’ โ‰ˆ ๐Ÿ๐Ÿ๐Ÿ– ๐Ÿ’ = ๐Ÿ‘๐Ÿ nodes. ๏‚ง This design is based on local monitoring so it can be generically applied to any network structure. ๏‚ง A node uses a 35 Wh battery, so its energy is ๐Ÿ๐Ÿ๐Ÿ”๐ŸŽ๐ŸŽ๐ŸŽ ๐‰. ๏‚ง System energy, ๐‘ฌ๐’, is therefore ๐Ÿ๐Ÿ๐Ÿ”๐ŸŽ๐ŸŽ๐ŸŽ ๐‰ โˆ— ๐Ÿ๐Ÿ๐Ÿ– = ๐Ÿ๐Ÿ”๐Ÿ๐Ÿ๐Ÿ–๐ŸŽ๐ŸŽ๐ŸŽ ๐‰ Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 40. IV. Parameterization A. System-Level IDS ๐œฌ๐Ÿ๐ง and ๐šธ๐Ÿ๐ฉ ๏‚ง We first parameterize the system IDS ๐œฌ๐Ÿ๐ง and ๐œฌ๐Ÿ๐ฉ: ๏‚ง The per-host IDS ๐’‘๐Ÿ๐ฉ and ๐’‘๐Ÿ๐ง as given input. ๏‚ง ๐œฌ๐Ÿ๐ง and ๐œฌ๐Ÿ๐ฉ highly depend on the attacker behavior. ๏‚ง A persistent attacker constantly performs slandering attacks; ๏‚ง Voting a bad node as a good node, and vice versa. ๏‚ง However, a random or an insidious attacker will only perform slandering attacks randomly w/ ๐’‘๐’‚ to avoid detection. ๏‚ง We first differentiate the number of active bad nodes ๐‘ต๐’‚๐’ƒ from the number of inactive bad nodes ๐‘ต๐’Š๐’ƒ, with ๐‘ต๐’‚๐’ƒ + ๐‘ต๐’Š๐’ƒ = ๐‘ต๐’ƒ, such that at any time: Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 41. IV. Parameterization ๏‚ง An inactive bad node behaves as if it were a good node to evade detection. ๏‚ง It casts votes the same way as a good node would. ๏‚ง For a persistent attacker, ๐’‘๐’‚ = ๐Ÿ. ๏‚ง For a random attacker, ๐’‘๐’‚ = ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž. ๏‚ง For an insidious attacker: ๏‚ง a compromised node stays dormant until a critical mass of compromised nodes is gathered so that; ๏‚ง ๐’‘๐’‚ = ๐Ÿ when ๐‘ต๐’ƒ โ‰ฅ ๐‘ต๐‘ป๐’ƒ, and ๐’‘๐’‚ = ๐ŸŽ otherwise. ๏‚ง ๐‘ต๐‘ป๐’ƒ represents insidousness degree. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 42. IV. Parameterization ๏‚ง Here, ๐’Ž this is the number of detectors, and ๐’Ž๐’‚ is the majority of ๐’Ž. ๏‚ง The first summation aggregates the probability of a false negative stemming from selecting a majority of active bad nodes. ๏‚ง The second summation aggregates the probability of a false negative stemming from selecting a minority of ๐’Ž nodes from the set of active bad nodes which always cast incorrect votes, coupled with selecting a sufficient number of nodes from the set of good nodes and inactive bad nodes which make incorrect votes with probability ๐’‘๐Ÿ๐ง, resulting in a majority of incorrect votes being cast. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 43. IV. Parameterization B. Host IDS ๐’‘๐Ÿ๐ง and ๐’‘๐Ÿ๐ฉ ๏‚ง Next, we parameterize ๐’‘๐Ÿ๐ง and ๐’‘๐Ÿ๐ฉ for persistent, random, and insidious attacks ๏‚ง The system, after testing and debugging, determines a minimum threshold ๐‘ช๐‘ป such that ๐’‘๐Ÿ๐ง and ๐’‘๐Ÿ๐ฉ are acceptable to system design. ๏‚ง Persistent Attacks ๏‚ง Let ๐’‘๐’‘๐Ÿ๐ง and ๐’‘๐’‘๐Ÿ๐ฉ be the false negative probability and the false positive probability of the host IDS when ๐’‘๐’‚ = ๐Ÿ. ๏‚ง Let the minimum threshold ๐‘ช๐‘ป value set for the persistent attack case be denoted by ๐‘ช๐’‘๐‘ป. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 44. IV. Parameterization ๏‚ง Random Attacks ๏‚ง Let ๐’‘๐’“๐Ÿ๐ง and ๐’‘๐’“๐Ÿ๐ฉ be the false negative probability and the false positive probability of the host IDS when ๐’‘๐’‚ < ๐Ÿ. ๏‚ง The amount of evidence observable from a bad node would be diminished proportionally to ๐’‘๐’‚. ๏‚ง Consequently, with the same minimum threshold ๐‘ช๐’‘๐‘ป being used, the host false negative probability would increase. ๏‚ง The host false positive probability would remain the same, i.e. ๐’‘๐’“๐Ÿ๐ฉ = ๐’‘๐’‘๐Ÿ๐ฉ, because the attacker behavior does not affect false positives, given the same minimum threshold ๐‘ช๐’‘๐‘ป being used. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 45. IV. Parameterization ๏‚ง Insidious Attacks ๏‚ง Let ๐’‘๐’Š๐Ÿ๐ง and ๐’‘๐’Š๐Ÿ๐ฉ be the false negative and false positive probability of the host IDS under insidious attacks. ๏‚ง The false positive probability is not affected, so ๐’‘๐’Š๐Ÿ๐ฉ = ๐’‘๐’‘๐Ÿ๐ฉ. ๏‚ง Because insidious nodes stay dormant until a critical mass is achieved: Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 46. IV. Parameterization ๏‚ง The ๐’‘๐Ÿ๐ง and ๐’‘๐Ÿ๐ฉ values obtained above for would be a function of time as input to (10) for calculating system- level IDS ๐šธ๐Ÿ๐ง and ๐šธ๐Ÿ๐ฉ dynamically. ๏‚ง We apply the statistical analysis described by (1) - (4) to get the maximum likelihood estimates of ๐œท (with ๐œถ set as 1) under each attacker behavior model, and then utilize (5) and (6) to yield ๐’‘๐Ÿ๐ง and ๐’‘๐Ÿ๐ฉ. ๏‚ง The system minimum threshold ๐‘ช๐‘ป is set to ๐‘ช๐’‘๐‘ป = ๐ŸŽ. ๐Ÿ— to yield ๐’‘๐’‘๐Ÿ๐ง = ๐Ÿ”. ๐Ÿ‘% and ๐’‘๐’‘๐Ÿ๐ฉ = ๐Ÿ•. ๐Ÿ‘%. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 47. IV. Parameterization ๏‚ง Table IV summarizes beta values, and the resulting ๐’‘๐Ÿ๐ง and ๐’‘๐Ÿ๐ฉ values under various attacker behavior models. ๏‚ง The persistent attack model is a special case in which ๐’‘๐’‚ = ๐Ÿ. ๏‚ง The insidious attack model is another special case in which ๐’‘๐’‚ = ๐Ÿ during the โ€œall inโ€ attack period, and ๐’‘๐’‚ = ๐ŸŽ during the dormant period. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 48. IV. Parameterization C. Parameterizing ๐‘ช๐‘ป for Dynamic Intrusion Response ๏‚ง The parameterization of ๐’‘๐Ÿ๐ง and ๐’‘๐Ÿ๐ฉ above is based on a constant ๐‘ช๐‘ป being used. ๏‚ง A dynamic IDS response design is to adjust ๐‘ช๐‘ป in response to the attacker strength detected with the goal to maximize the system lifetime. ๏‚ง The attacker strength of a node ๐‘– may be estimated periodically by node ๐‘–โ€™s intrusion detectors. ๏‚ง That is, the compliance degree value of node ๐’Š, ๐‘ฟ๐’Š(๐’•), based on observations collected during [๐’• โˆ’ ๐‘ป๐ˆ๐ƒ๐’, ๐’•], is compared against the minimum threshold ๐‘ช๐’‘๐‘ป set for persistent attacks. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 49. IV. Parameterization ๏‚ง If ๐‘ฟ๐’Š ๐’• < ๐‘ช๐’‘๐‘ป, then node ๐’Š is considered a bad node performing active attacks at time ๐’•; otherwise, it is a good node. ๏‚ง This information is passed to the control module which subsequently estimates ๐‘ต๐’‚๐’ƒ(๐’•), representing the attacker strength at time ๐’•. ๏‚ง We want a simple yet efficient IDS response design that can decrease ๐’‘๐Ÿ๐ง when the attacker strength is high, allowing quick removal of active attackers to prevent impairment failure. ๏‚ง This goal is achieved by increasing the ๐‘ช๐‘ป value. ๏‚ง Conversely, when there is little attacker evidence detected, we lower ๐‘ช๐‘ป to quickly decrease ๐’‘๐Ÿ๐ฉ and prevent Byzantine failure. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 50. IV. Parameterization ๏‚ง While there are many possible ways to dynamically control ๐‘ช๐‘ป, this paper considers a linear one-to-one mapping function: ๏‚ง We set ๐‘ช๐‘ป to ๐‘ช๐’‘๐‘ป when ๐‘ต๐’‚๐’ƒ ๐’• detected at time ๐’• is 1, and linearly increase/decrease ๐‘ช๐‘ป with increasing/decreasing attacker strength. ๏‚ง With ๐‘ช๐’‘๐‘ป = ๐ŸŽ. ๐Ÿ— in our CPS reference system, we set ๐œน๐‘ช๐‘ป = ๐ŸŽ. ๐Ÿ“ and parameterize ๐‘ช๐‘ป(๐’•) as: ๏‚ง When ๐‘ช๐‘ป is closer to 1, a node will more likely be considered as compromised even if it wanders only for a small amount of time in insecure states. ๏‚ง A large ๐‘ช๐‘ป induces a small ๐’‘๐Ÿ๐ง at the expense of a large ๐’‘๐Ÿ๐ฉ. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 51. IV. Parameterization D. Energy ๏‚ง Lastly, we parameterize ๐‘ต๐ˆ๐ƒ๐’, the maximum number of intrusion detection cycles the system can possibly perform before energy exhaustion. ๏‚ง ๐‘ต๐ˆ๐ƒ๐’ = ๐‘ฌ๐’/๐‘ฌ๐ˆ๐ƒ๐’ (14), where ๐‘ฌ๐’ is the initial energy of the reference CPS. ๏‚ง ๐‘ฌ๐ˆ๐ƒ๐’ is the energy consumed per ๐‘ป๐ˆ๐ƒ๐’ interval due to ranging, sensing, and intrusion detection functions, calculated as: ๏‚ง The energy spent per node is multiplied with the node population in the CPS to get the total energy spent by all nodes per cycle. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 52. IV. Parameterization ๏‚ง ๐‘ฌ๐’“๐’‚๐’๐’ˆ๐’Š๐’๐’ˆ is calculated as: ๏‚ง A node spends ๐‘ฌ๐’• energy to transmit a CDMA waveform. ๏‚ง Its ๐’ neighbors each spend ๐‘ฌ๐’‚ energy to transform it into distance. ๏‚ง This operation is repeated for ๐œธ times for determining a sequence of locations. ๏‚ง ๐‘ฌ๐’”๐’†๐’๐’”๐’Š๐’๐’ˆ is computed as: ๏‚ง A node spends ๐‘ฌ๐’” energy for sensing navigation and multipath mitigation data, and ๐‘ฌ๐’‚ energy for analyzing sensed data for each of its ๐’ neighbors. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 53. IV. Parameterization ๏‚ง ๐‘ฌ๐’…๐’†๐’•๐’†๐’„๐’•๐’Š๐’๐’ can be calculated by: ๏‚ง We consider the energy required to choose ๐‘š intrusion detectors to evaluate a target node (the first term), and the energy required for ๐’Ž intrusion detectors to vote (the second term). Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 54. V. Numerical Data A. Effect of Intrusion Detection Strength ๏‚ง We first examine the effect of intrusion detection strength measured by the intrusion interval, ๐‘ป๐ˆ๐ƒ๐’, and the number of intrusion detectors, ๐’Ž. (Persistent attacks only) ๏‚ง Fig. 3 shows MTTF versus ๐‘ป๐ˆ๐ƒ๐’ as the number of detectors ๐’Ž in the system-level IDS varies over the range of [3,11] in increments of 2. ๏‚ง There exists an optimal ๐‘ป๐ˆ๐ƒ๐’ value at which the system lifetime is maximized to best tradeoff energy consumption versus intrusion tolerance. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 55. V. Numerical Data ๏‚ง Initially, when ๐‘ป๐ˆ๐ƒ๐’ is too small, the system performs ranging, sensing, and intrusion detection too frequently, and quickly exhausts its energy, resulting in a small lifetime. ๏‚ง As ๐‘ป๐ˆ๐ƒ๐’ increases, the system saves more energy, and its lifetime increases. ๏‚ง Finally, when ๐‘ป๐ˆ๐ƒ๐’ is too large, it saves more energy but fails to catch bad nodes often enough. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 56. V. Numerical Data ๏‚ง Bad nodes through active attacks can cause impairment security failure. ๏‚ง When the system has 1/3 or more bad nodes out of the total population, a Byzantine failure occurs. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 57. V. Numerical Data ๏‚ง We observe that the optimal ๐‘ป๐ˆ๐ƒ๐’ value at which the system MTTF is maximized is sensitive to the ๐’Ž value. ๏‚ง The general trend is that, as ๐’Ž increases, the optimal ๐‘ป๐ˆ๐ƒ๐’ value decreases. ๏‚ง Here we observe that ๐’Ž = ๐Ÿ• is optimal to yield the maximum MTTF. ๏‚ง Using ๐’Ž = ๐Ÿ• can best balance energy exhaustion failure versus security failure for high reliability. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 58. V. Numerical Data ๏‚ง Fig. 4 shows MTTF versus ๐‘ป๐ˆ๐ƒ๐’ as the compromising rate ๐€๐’„ varies over the range of once per 4 hours to once per 24 hours. ๏‚ง This tests the sensitivity of MTTF with respect to ๐€๐’„, with ๐’Ž fixed at five to isolate its effect. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 59. V. Numerical Data ๏‚ง As ๐€๐’„ increases, MTTF decreases because a more compromised nodes will be present in the system. ๏‚ง The optimal ๐‘ป๐ˆ๐ƒ๐’ decreases as ๐€๐’„ increases because more compromised nodes exist, and the system needs to execute intrusion detection more frequently to maximize MTTF. ๏‚ง Fig. 4 identifies the best ๐‘ป๐ˆ๐ƒ๐’ to be used to maximize the lifetime of the reference CPS to balance energy exhaustion versus security failure. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 60. V. Numerical Data B. Effect of Attacker Behavior ๏‚ง We analyze the effect of various attacker behavior models, including persistent, random, and insidious attacks. ๏‚ง The analysis conducted here is based on static ๐‘ช๐‘ป. ๏‚ง Fig. 5 shows MTTF versus ๐‘ป๐ˆ๐ƒ๐’ with varying ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž values. ๏‚ง The system MTTF is low when ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž is small. ๏‚ง Most bad nodes are dormant and remain undetected. ๏‚ง Eventually, the system suffers from Byzantine failure quickly, leading to a low MTTF. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 61. V. Numerical Data ๏‚ง As ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž increases from 0.025 to 0.2, the system MTTF increases. ๏‚ง Bad nodes are more likely to be detected and removed. ๏‚ง As ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž increases further, however, the system MTTF decreases again. ๏‚ง Due to larger number of impairment attacks. ๏‚ง In the extreme case of ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž = ๐Ÿ, all bad nodes perform attacks, and the system failure is mainly caused by impairment. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 62. V. Numerical Data ๏‚ง The maximum MTTF occurs when ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž = ๐ŸŽ. ๐Ÿ. ๏‚ง The probability of security failure due to either type of security attacks is minimized. ๏‚ง This represents a balance of impairment security failure rate vs. Byzantine failure rate dictated by the parameter settings of the reference CPS. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 63. V. Numerical Data ๏‚ง Fig. 6 compares the MTTF versus ๐‘ป๐ˆ๐ƒ๐’ of the reference CPS under the three attacker types. ๏‚ง MTTF of the CPS is the highest under random attacks. ๏‚ง MTTF of the CPS under persistent attacks is the second highest. ๏‚ง As expected, the CPS under insidious attacks has the lowest MTTF. ๏‚ง Unlike persistent attacks which aim to cause impairment failure, insidious attacks while dormant can cause Byzantine failure, and โ€œ โ€all inโ€โ€œ can also cause impairment failure. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 64. V. Numerical Data ๏‚ง MTTF variation depends on the relative rate at which impairment failure vs. Byzantine failure occurs. ๏‚ง The former is dictated by ๐€๐ข๐Ÿ, and the latter is dictated by how fast the Byzantine failure condition is satisfied. ๏‚ง The MTTF difference between persistent attacks and insidious attacks is relatively significant is due to a large Byzantine failure rate compared with the impairment failure rate. ๏‚ง However, the reference CPS under random attacks can more effectively prevent either Byzantine failure or impairment failure from occurring by removing bad nodes as soon as they perform attacks. ๏‚ง The system MTTF difference between random versus persistent attacks again depends on the relative rate at which impairment failure versus Byzantine failure occurs. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 65. V. Numerical Data C. Effect of Intrusion Response ๏‚ง We analyze the effect of intrusion response (dynamic ๐‘ช๐‘ป) to attacker strength detected at runtime on the system MTTF. ๏‚ง Fig. 7 shows MTTF versus ๐‘ป๐ˆ๐ƒ๐’ under the static ๐‘ช๐‘ป design and the dynamic ๐‘ช๐‘ป design for the persistent attack case. ๏‚ง There is a significant gain in MTTF under dynamic ๐‘ช๐‘ป over static ๐‘ช๐‘ป. ๏‚ง With persistent attacks, all bad nodes are actively performing attacks, so increasing ๐‘ช๐‘ป to a high level to quickly removes bad nodes to prevent impairment failure. ๏‚ง Also, the optimal ๐‘ป๐ˆ๐ƒ๐’ decreases for the dynamic configuration. ๏‚ง This allows the IDS to remove bad nodes from the system quickly. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 66. V. Numerical Data ๏‚ง Fig. 8 shows the MTTF vs. ๐‘ป๐ˆ๐ƒ๐’ under the static ๐‘ช๐‘ป design and the dynamic ๐‘ช๐‘ป design for the random attack case with ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž = ๐ŸŽ. ๐Ÿ. ๏‚ง ๐’‘๐’“๐’‚๐’๐’…๐’๐’Ž = ๐ŸŽ. ๐Ÿ yields the highest MTTF among all random attack cases in the reference CPS system. ๏‚ง Again, dynamic ๐‘ช๐‘ป performs significantly better than static ๐‘ช๐‘ป at the identified optimal ๐‘ป๐ˆ๐ƒ๐’ value. ๏‚ง The optimal ๐‘ป๐ˆ๐ƒ๐’ value under dynamic ๐‘ช๐‘ป design again is smaller than that under static ๐‘ช๐‘ป design to quickly remove nodes that perform active attacks. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 67. V. Numerical Data ๏‚ง Fig. 9 shows the MTTF versus ๐‘ป๐ˆ๐ƒ๐’ under the static ๐‘ช๐‘ป design and the dynamic ๐‘ช๐‘ป design for the insidious attack case. ๏‚ง The MTTF difference is relatively small compared with persistent or random attacks. ๏‚ง Bad nodes do not perform active attacks until a critical mass is reached, so dynamic ๐‘ช๐‘ป would set a lower ๐‘ช๐‘ป value during the dormant period while rapidly setting a higher ๐‘ช๐‘ป value during the attack period. ๏‚ง Since the attack period is relatively short compared with the dormant period, the gain in MTTF isn't very significant. ๏‚ง Still, dynamic ๐‘ช๐‘ป performs better than static ๐‘ช๐‘ป. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 68. V. Numerical Data โ€ข As our ๐‘ช๐‘ป dynamic control function (12) adjusts ๐‘ช๐‘ป solely based on the attacker strength detected regardless of the attacker type, we conclude that the dynamic ๐‘ช๐‘ป design as a response to attacker strength detected at runtime can improve MTTF compared with the static ๐‘ช๐‘ป design. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 69. VI. Conclusions and Future Work ๏‚ง This paper explores the development of a probability model to analyze the reliability of a cyber physical system (CPS) containing malicious nodes exhibiting a range of attacker behaviors and an intrusion detection and response system (IDRS) for detecting and responding to malicious events at runtime. ๏‚ง For each attacker behavior, we identified the best detection strength (in terms of the detection interval and the number of detectors), and the best response strength (in terms of the per-host minimum compliance threshold for setting the false positive and negative probabilities), under which the reliability of the system may be maximized. ๏‚ง There are several future research directions, including: ๏‚ง Investigating other intrusion detection criteria other than the current binary criterion used in the paper; ๏‚ง Exploring other attack behavior models (e.g., an oracle attacker that can adjust the attacker strength depending on the detection strength to maximize security failure), and investigating the best dynamic response design to cope with such attacks. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen
  • 70. Itโ€™s finally over! Questions? Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems Robert Mitchell, Ing-Ray Chen