2011
DOI: 10.1007/978-3-642-24864-1_3
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems

Abstract: Today's power grid depends on embedded control systems to function properly. Securing these systems presents a unique challenge, since on top of the resource restrictions inherent to embedded devices, SCADA systems must accommodate strict timing requirements that are nonnegotiable, and their massive scale greatly amplifies costs such as power consumption. Together, these constraints make the conventional approach to host intrusion detection-namely, using a hypervisor to create a safe environment from which a m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…These type of attacks are used with the composition of other attacks. Moreover, some IDSs approaches have been proposed to specifically for resource constraint devices [98,99,100]. Signature detection, anomaly detection, Machine learning based approaches are knowledge-based techniques.…”
Section: Specification Based Approachmentioning
confidence: 99%
“…These type of attacks are used with the composition of other attacks. Moreover, some IDSs approaches have been proposed to specifically for resource constraint devices [98,99,100]. Signature detection, anomaly detection, Machine learning based approaches are knowledge-based techniques.…”
Section: Specification Based Approachmentioning
confidence: 99%
“…For example, ACAP [41] uses Kprobes to capture network packets by probing important functions in the INET socket layer while Atom LEAP [42] leverages Kprobes to place "energy calipers" at arbitrary kernel code locations for measuring and characterizing the energy usage of a system. However, to the best of our knowledge, the Autoscopy effort [15,16,43] is the first to leverage Kprobes as a tool for system protection.…”
Section: Related Workmentioning
confidence: 99%
“…Several attempts [19,3,22,6] have been made at creating efficient monitoring devices for determining if malware has been loaded onto an embedded system. Most, with the exception of Cui et al, of these systems involve either modeling performance metrics of the embedded system and comparing them against previous run times or theoretical run time bounds.…”
Section: Monitor Systemmentioning
confidence: 99%