360 likes | 454 Views
On Survivability of Mobile Cyber Physical Systems with Intrusion Detection. Author s: Robert Mitchell, Ing -Ray Chen. Presented by: Ting Hua. Outline. Introduction System Model / Reference Configuration Theoretical Analysis Numerical Data Simulation Conclusion. Introduction.
E N D
On Survivability of Mobile Cyber Physical Systems with Intrusion Detection Authors: Robert Mitchell, Ing-Ray Chen Presented by: Ting Hua
Outline • Introduction • System Model / Reference Configuration • Theoretical Analysis • Numerical Data • Simulation • Conclusion
Introduction • Problem • address the survivability issue of a mobile cyber physical system(MCPS) • Key issue • best balance between energy conservation and intrusion tolerance • Highlight of the scheme • dynamic voting-based intrusion detection
Outline • Introduction • System Model / Reference Configuration • Theoretical Analysis • Numerical Data • Simulation • Conclusion
Node Model Computing Communicating Energy Sensing
System Model • Ranging • transmit a CDMA waveform to neighbors • receive the waveform from neighbors • transform received waveform into distance • Sensing • sensing data • analyzing sensed data • Intrusion detection • choose m intrusion detectors • vote
Attack Model • Node capture • Bad data injection • Attack from inside • False vote Attack
System Fails • Security Failure:Byzantine fault model • One-third or more of the nodes are compromised, then the system fails. • Energy Exhaustion • Our goal: maximizing the lifetime until energy exhaustion Attack
Per-node Security Fault • Per-node false negative • a single intrusion detector misidentifies a bad node as a good node. • Per-node false positive • a single intrusion detector misidentifies a good node as a bad node
System-wide Security Fault • System-wide false negative • a pool of intrusion detectors reaches an incorrect majority decision that a bad node is good. • System-wide false positive • a pool of intrusion detectors reaches an incorrect majority decision that a good node is bad.
Combined intrusion detection • Per-host intrusion detection • event sequence matching: determines a sequence of location of a neighbor node • Systemintrusion detection • Select m voters • coordinator is selected randomly among neighbors • The coordinator then selects m voters randomly (including itself) • Voting • Majority • Dynamical: m, detection interval, depending on the percentage of bad nodes
Outline • Introduction • System Model / ReferenceConfiguration • Theoretical Analysis • Numerical Data • Simulation • Conclusion
SPN model for MCPS • Nodes: places to hold tokens. • Ng: the number of good nodes. • Nb: the number of bad nodes undetected. • Ne: the number of nodes evicted. • Energy: a binary variable. • 1 : energy availability. • 0 : indicating energy exhaustion.
SPN model for MCPS Voting-based intrusion detection • Events: transitions. • TCP: good nodes being compromised. • TFP: a good node being falsely identified as compromised. • TIDS: a bad node being detected as compromised correctly. • TENERGY: energy exhaustion.
Underlying semi-Markov model of the SPN mode Initial state 128 sensor-carried mobile nodes
Underlying semi-Markov model of the SPN mode TCP -Good nodes may become compromised because of insider attacks -per-node compromising rate λ aggregate rate
Underlying semi-Markov model of the SPN mode TIDS -a bad node is detected as compromised
Underlying semi-Markov model of the SPN mode TFP -a good node is detected as compromised
Underlying semi-Markov model of the SPN mode TENERGY -system energy is exhausted after N × TIDS intervals -energy exhaustion event can possibly occur in any state, when energy is still available
False Alarm Probability Choose a minority of good nodes from the set o f all good nodes Choose a majority of bad nodes from the set o f all bad nodes selecting a majority of bad nodes choose a minority of bad nodes from the set of all bad nodes K of good nodes make false negative decision selecting a majority of good nodes
False Alarm Probability Choose a minority of good nodes from the set o f all good nodes Choose a majority of bad nodes from the set o f all bad nodes selecting a majority of bad nodes choose a minority of bad nodes from the set of all bad nodes K of good nodes make false negative decision selecting a majority of good nodes
Underlying semi-Markov model of the SPN mode dynamically adjust the transition rates to TIDS and TFP Dynamic voting-based intrusion detection in response to changing environments
Survivability Assessment • Mean time to failure(MTTF) • Failure • Energy is exhausted: energy=0 • Big bad node population: • How to Calculate? • the accumulated “ reward” o f the underlying semi-Markov reward model • Reward
Outline • Introduction • System Model / ReferenceConfiguration • Theoretical Analysis • Numerical Data • Simulation • Conclusion
Numerical Data • Objective • Optimal values of TIDS and m to maximize MTTF • Maximum number N of intrusion detection cycles before energy exhaustion
System Model • Ranging • transmit a CDMA waveform to neighbors • receive the waveform from neighbors • transform received waveform into distance • Sensing • sensing data(navigation and multipath mitigation data) • analyzing sensed data • Intrusion detection • choose m intrusion detectors • vote
Numerical Data repeated for α times for determining a sequence o f locations neighbors Energy spent for ranging, sensing, and intrusion detection in a TIDS interval per node Node population in MCPS Energy spent in choosing m intrusion detectors to evaluate a target node Energy spent inm intrusion detectors to vote
Results-Theoretical • TIDS • Too small • performs ranging, sensing and intrusion detection too frequently • quickly exhausts energy • Increases • save more energy and lifetime increases • Too large • intrusion detection less frequently, fails to catch bad nodes often enough • Byzantine failure: 1 /3 or more bad nodes out of the total population
Results-Theoretical • M: number of intrusion detectors • General trend • m decreases, optimal TIDS value • Less intrusion detection, higher invocation frequency to prevent security failures • M=5 • too many • energy exhaustion failure • too few • security failure
Results-Theoretical • Compromising rate λ increases • MTTF decreases • higher λ will cause more compromised nodes • Optimal TIDS decreases • more compromised nodes, intrusion detection more frequently to maximize MTTF
Results-Theoretical • MTTF- • Low • lower m benefits MTTF • High • higher m benefits MTTF
Outline • Introduction • System Model / Reference Configuration • Theoretical Analysis • NumericalData • Simulation • Conclusion
Results-Simulation • Simulation Tool • SMPL • Schedules events • node capture • intrusion detection audits • energy exhaustion • A simulation run ends: • security failure • exhausts energy • all nodes have been evicted • MTTF • grand mean out of a large number of MTTF • batch means analysis to satisfy 95% confidence level and 10% accuracy requirements • grand mean falls within 10% of the true mean with 95% confidence
Results-Simulation • Matches well • One peak with similar peak value • a left/positive skew • pronounced right tail Simulation Results Analytical results
Outline • Introduction • System Model / Reference Configuration • Theoretical Analysis • NumericalData • Simulation • Conclusion
Conclusion • System failure definition • energy exhaustion • security failure • Optimal design settings for voting-based intrusion detection • Input: • per-node false alarm probabilities • pre-node compromise rates λ • Output • Best number of detectors (m ) • Best intrusion detection interval (TIDS)