Suhankar Mishra1, Thang N. Dinh2, My T. Thai1, and Incheol Shin3

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
The strength of routing Schemes. Main issues Eliminating the buzz: Are there real differences between forwarding schemes: OSPF vs. MPLS? Can we quantify.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Worm Origin Identification Using Random Moonwalks Yinglian Xie, V. Sekar, D. A. Maltz, M. K. Reiter, Hui Zhang 2005 IEEE Symposium on Security and Privacy.
Network Innovation using OpenFlow: A Survey
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Network Coding and Reliable Communications Group Network Coding for Multi-Resolution Multicast March 17, 2010 MinJi Kim, Daniel Lucani, Xiaomeng (Shirley)
Communication operations Efficient Parallel Algorithms COMP308.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
1 TDMA Scheduling in Competitive Wireless Networks Mario CagaljHai Zhan EPFL - I&C - LCA February 9, 2005.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
Deep Packet Inspection with Regular Expression Matching Min Chen, Danny Guo {michen, CSE Dept, UC Riverside 03/14/2007.
Power saving technique for multi-hop ad hoc wireless networks.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Critical Information Infrastructure Protection: Urgent vs. Important Miguel Correia 2012 Workshop on Cyber Security and Global Affairs and Global Security.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
L13. Shortest path routing D. Moltchanov, TUT, Spring 2008 D. Moltchanov, TUT, Spring 2014.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
QoS-Aware In-Network Processing for Mission-Critical Wireless Cyber-Physical Systems Qiao Xiang Advisor: Hongwei Zhang Department of Computer Science Wayne.
Common Devices Used In Computer Networks
Lab for Advanced Network Design, Evaluation and Research Mobility Profile based Routing Within Intermittently Connected Mobile Ad hoc Networks (ICMAN)
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Quality of Service Routing Anunay Tiwari Anirudha Sahoo.
Department of Computer Science and Engineering Applied Research Laboratory Architecture for a Hardware Based, TCP/IP Content Scanning System David V. Schuehler.
1 The Encoding Complexity of Network Coding Michael Langberg California Institute of Technology Joint work with Jehoshua Bruck and Alex Sprintson.
1 © A. Kwasinski, 2015 Cyber Physical Power Systems Fall 2015 Security.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
Minimum spanning tree diameter estimation in random sensor networks in fractal dimension Students: Arthur Romm Daniel Kozlov Supervisor: Dr.Zvi Lotker.
COMP8330/7330/7336 Advanced Parallel and Distributed Computing Communication Costs in Parallel Machines Dr. Xiao Qin Auburn University
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
Protocols and layering Network protocols and software Layered protocol suites The OSI 7 layer model Common network design issues and solutions.
Artificial Intelligence In Power System Author Doshi Pratik H.Darakh Bharat P.
Impact of Interference on Multi-hop Wireless Network Performance
Internet Quarantine: Requirements for Containing Self-Propagating Code
IMPROVING OF WIRELESS MESH NETWORKS.
Confluent vs. Splittable Flows
University of Maryland College Park
Mathematical Foundations of AI
Distributed Vehicle Routing Approximation
New Characterizations in Turnstile Streams with Applications
Multicast Outline Multicast Introduction and Motivation DVRMP.
ETHANE: TAKING CONTROL OF THE ENTERPRISE
Introduction to Wireless Sensor Networks
Data Streaming in Computer Networking
A Study of Group-Tree Matching in Large Scale Group Communications
Wireless Sensor Network Architectures
Worm Origin Identification Using Random Moonwalks
Network Components.
Dude, where’s that IP? Circumventing measurement-based geolocation
CS223 Advanced Data Structures and Algorithms
The Power of Two in Consistent Network Updates: Hard Loop Freedom, Easy Flow Migration Klaus-Tycho Förster and Roger Wattenhofer.
Tools for the Analysis and Design of Complex Multi-Scale Networks: Dynamics; Security; Uncertainty MURI Annual Review Columbus OH, October 14, 2010 J.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Communication operations
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
Barrier Coverage with Optimized Quality for Wireless Sensor Networks
Consideration on applying ICN to Edge Computing
Smart Content Delivery in Large Networks: En-Route Caching
Combinatorial Optimization of Multicast Key Management
Introduction to Maximum Flows
Advisor: Yeong-Sung, Lin, Ph.D. Presented by Yu-Ren, Hsieh
Other Routing Protocols
OpenSec:Policy-Based Security Using Software-Defined Networking
Introduction to Maximum Flows
Horizon: Balancing TCP over multiple paths in wireless mesh networks
Presentation transcript:

Optimal Inspection Points for Malicious Attack Detection in Smart Grids Suhankar Mishra1, Thang N. Dinh2, My T. Thai1, and Incheol Shin3 Dept. of Comp. & Inf. & Sci. & Eng., University of Florida, Gainesville, Florida, USA1 Dept. of Comp. Sci., Virginia Commonwealth University, Richmond, VA, USA2 Info. Security Dept., Mokpo National University Muan, Rep. of Korea3

Outline Motivation Optimal Inspection Points Problem Single-path routings: FPTAS for trees Multiple-path routing: FPTAS for SP-graphs Discussion

Motivation Smart grids = Old electricity network New communication Intelligence Automation SCADA (Distribution Supervisory Control and Data Acquisition) Transmits individual device status, distribution control commands, access logs, etc. Vulnerable to intercepting, tampering, and forging data

Motivation (cont.) Solution: Deep Packet Inspection (DPI) Challenges Advanced Firewalls for SCADA/ICS Dig deeper into the protocols to understand the message content and apply more detailed rules Challenges Cannot be deployed at all points (e.g. economic reason) Cannot scanned all messages (limited capacity) Strict latency constraints Exp: 3ms for fault isolation and protection control messages (IEC 61850)

Optimal Inspection Points (OIP) Problem 𝛿 𝑢 : DPI delay 𝑚 𝑢 : Capacity 𝑟: center 𝑓(𝑢, 𝑣): Packet flow 𝑂: Intmd nodes S: terminal nodes

OIP Problem (cont.) Input: A directed acyclic graph 𝑮=(𝑽, 𝑬) 𝑽= 𝒓 ∪𝑶 ∪𝑺, where 𝑟: SCADA center. All packets are forwarded towards 𝑟 S: Terminal nodes that might send malicious packets. O: Set of intermediate nodes where DPI can be deployed 𝜹 𝒖 : Delay caused by employing DPI at 𝑢, ∀𝑢∈𝑂 𝒎 𝒖 : Capacity (#packets) of DPI scanner at 𝑢, ∀𝑢∈𝑂 𝜹 𝒎𝒂𝒙 : Maximum allowable delay for DPI at 𝑟 Flow 𝒇 𝒖, 𝒗 ≥0: traffic(#packets) 𝑢→𝑣, ∀ 𝑢, 𝑣 ∈𝐸 Problem: Find a subset of points 𝐷⊆𝑉 to deploy DPI Accumulating delay at 𝑟 for DPI ≤ 𝛿 𝑚𝑎𝑥 Maximize the #scanned packets

Complexity Theorem 1: OIP problem is NP-complete, even when the graph is a simple path.

Single-path vs. Multi-path routing Single-path routing Multi-path routing (Single route, E.g. OSPF) (Different routes possible) #packets routed along (𝑢, 𝑣) is proportional to 𝑓(𝑢,𝑣) v u u

Single-path routing The graph is a tree rooted at 𝑟 There exists Fully Polynomial-Time Approximation Scheme

Single-path routing

Single-path: Dynamic Programming

Multi-path routing FPTAS for Series-Parallel graphs

Multi-path: FPTAS

Multi-path: FPTAS Series Operations Parallel Operations

Conclusions & Discussion Introduce Optimal Inspection Points problem in Smart Grids and prove its NP-completeness. FPTAS for single-path routing FPTAS for multi-path routing in SP-graphs Approximation Algorithms for Multi-path routing in general graph

Thank you for your listening! Questions & Answers Thank you for your listening!