Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems 2010
DOI: 10.1145/1795194.1795210
|View full text |Cite
|
Sign up to set email alerts
|

Time-based intrusion detection in cyber-physical systems

Abstract: Abstract-Embedded systems, particularly real-time systems with temporal constraints, are increasingly deployed in every day life. Such systems that interact with the physical world are also referred to as cyber-physical systems (CPS). These systems commonly find use in critical infrastructure from transportation to health care. While security in CPS-based real-time embedded systems has been an afterthought, it is becoming a critical issue as these systems are increasingly networked and inter-dependent. The adv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
43
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 92 publications
(45 citation statements)
references
References 26 publications
1
43
0
Order By: Relevance
“…Carcano, et al [6] propose a specification based IDS that extends [15]; it distinguishes faults from attacks, describes a language to express a CPS specification, and establishes a critical state distance metric. Zimmer, et al [29] study a specification based IDS that instruments a target application, and uses a scheduler to confirm timing analysis results. Our work is also specification based.…”
Section: Introductionmentioning
confidence: 99%
“…Carcano, et al [6] propose a specification based IDS that extends [15]; it distinguishes faults from attacks, describes a language to express a CPS specification, and establishes a critical state distance metric. Zimmer, et al [29] study a specification based IDS that instruments a target application, and uses a scheduler to confirm timing analysis results. Our work is also specification based.…”
Section: Introductionmentioning
confidence: 99%
“…Host-Based Audit. Many IDSs Mitchell and Chen 2011, 2013d, 2013cLauf et al 2010;He and Blum 2011;Zhang et al 2011bZhang et al , 2011aAsfaw et al 2010;Carcano et al 2011;Zimmer et al 2010;Mitchell and Chen 2012b, 2012a, 2013b, 2013a that use host-based auditing analyze logs maintained by a node or other audit data, such as file system details, to determine if it is compromised. One major advantage of using host-based auditing is distributed control; this is attractive for high-volume configurations like smart grids.…”
Section: Audit Materialsmentioning
confidence: 99%
“…This paper addresses three of the unique aspects of CPS. Zimmer et al [2010] propose a behavior-specification-based approach to intrusion detection for smart utility (power) applications called T-Rex. T-Rex uses host-based auditing.…”
Section: Behavior Specification/hostmentioning
confidence: 99%
“…Christopher Zimmer, et al, in [71] present three mechanisms for time-based intrusion detection to detect the execution of unauthorized instructions in real-time CPS environments and develop techniques to detect intrusions in a self-checking manner by application and through the operating system scheduler.…”
Section: Copyright ⓒ 2015 Serscmentioning
confidence: 99%