Attacks and Counter Defense Mechanisms for Cyber-Physical Systems 1 Taha Hassan Lulu Wang CS 5214 Fall 2015.

Slides:



Advertisements
Similar presentations
Many useful applications, especially in queueing systems, inventory management, and reliability analysis. A connection between discrete time Markov chains.
Advertisements

Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Wireless Sensor Networks: Perimeter Security By Jeremy Prince, Brad Klein, Brian Wang, & Kaustubh Jain.
Artificial Intelligence in Game Design Introduction to Learning.
Reliable System Design 2011 by: Amir M. Rahmani
Energy Aware Self Organized Communication in Complex Networks Jakob Salzmann, Dirk Timmermann SPP 1183 Third Colloquium Organic Computing, ,
A Game-theoretic Approach to the Design of Self-Protection and Self-Healing Mechanisms in Autonomic Computing Systems Birendra Mishra Anderson School of.
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering.
Probabilistic Verification of Discrete Event Systems Håkan L. S. Younes.
CS 603 Communication and Distributed Systems April 15, 2002.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
Introduction Before… Next…
ECE 5214 Modeling and Evaluation of Computer Networks Kavya Sagi.
Effect Of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks Author: J.H. Cho, I.R. Chen and P.G. Feng.
Effect of Intrusion Detection on Reliability Jin-Hee Cho, Member, IEEE, Ing-Ray Chen, Member, IEEE, and Phu-Gui Feng IEEE TRANSACTIONS ON RELIABILITY,
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
Reliability of Wireless Sensors with Code Attestation for Intrusion Detection Presented by: Yating Wang.
MODELING AND ANALYSIS OF ATTACKS AND COUNTER DEFENSE MECHANISMS FOR CYBER PHYSICAL SYSTEMS -Robert Mitchell, Ing-Ray Chen, Member, IEEE Presented By, Manasa.
Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing Fenye Bao, Ing-Ray Chen, Moonjeong Chang Presented.
Layered Approach using Conditional Random Fields For Intrusion Detection.
March 8, 2006  Yvo Desmedt Robust Operations Research II: Production Networks by Yvo Desmedt University College London, UK.
Software Reliability SEG3202 N. El Kadri.
Effect of Redundancy on Mean Time to Failure of Wireless Sensor Networks Anh Phan Speer, Ing-Ray Chen Paper Presented by: Misha, Neha & Vidhya CS 5214.
Andreas Larsson, Philippas Tsigas SIROCCO Self-stabilizing (k,r)-Clustering in Clock Rate-limited Systems.
Optimal Power Control, Rate Adaptation and Scheduling for UWB-Based Wireless Networked Control Systems Sinem Coleri Ergen (joint with Yalcin Sadi) Wireless.
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 10 Instructor: Haifeng YU.
1 ECE-517: Reinforcement Learning in Artificial Intelligence Lecture 6: Optimality Criterion in MDPs Dr. Itamar Arel College of Engineering Department.
DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
Distributed Monitoring and Aggregation in Wireless Sensor Networks INFOCOM 2010 Changlei Liu and Guohong Cao Speaker: Wun-Cheng Li.
Probability Distributions u Discrete Probability Distribution –Discrete vs. continuous random variables »discrete - only a countable number of values »continuous.
Building Dependable Distributed Systems Chapter 1 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Scalable Computing on Open Distributed Systems Jon Weissman University of Minnesota National E-Science Center CLADE 2008.
Secure Systems Research Group - FAU 1 Active Replication Pattern Ingrid Buckley Dept. of Computer Science and Engineering Florida Atlantic University Boca.
CALTECH CS137 Winter DeHon CS137: Electronic Design Automation Day 8: February 4, 2004 Fault Detection.
Trust-Sensitive Scheduling on the Open Grid Jon B. Weissman with help from Jason Sonnek and Abhishek Chandra Department of Computer Science University.
Re-Configurable Byzantine Quorum System Lei Kong S. Arun Mustaque Ahamad Doug Blough.
V1.7Fault Tolerance1. V1.7Fault Tolerance2 A characteristic of Distributed Systems is that they are tolerant of partial failures within the distributed.
4.3 More Discrete Probability Distributions NOTES Coach Bridges.
J.-H. Cho, I.-R. Chen, M. Eltoweissy ACM/Springer Wireless Networks, 2007 Presented by: Mwaffaq Otoom CS5214 – Spring © 2007 On optimal batch re-keying.
CS 3471 CS 347: Parallel and Distributed Data Management Notes13: Time and Clocks.
NETWORK TOPOLOGY Network topology is the study of the arrangement or mapping of the elements of a network,especially the physical.
Medium Access Control in Wireless networks
Replicated Object Management with Periodic Maintenance in Mobile Wireless Systems By Ding-Chau Wang, In-Ray Chen, Chin-Ping Chu, and I-ling Yen CS5214.
MITRE 7 April 2009 CS 5214 Presenter: Phu-Gui Feng Performance Analysis of Distributed IDS Protocols for Mobile GCS Dr. Jin-Hee Cho, Dr. Ing-Ray Chen MITRE.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
Communications Range Analysis Simulation Set Up –Single Biological Threat placed in Soldier Field –Communication range varied from meters –Sensor.
Reliability of Wireless sensors with code attestation for intrusion detection Ing-Ray Chen, Yating Wang, Ding-Chau Wang Information Processing Letters.
Research Direction Introduction Advisor: Frank, Yeong-Sung Lin Presented by Hui-Yu, Chung 2011/11/22.
CALTECH CS137 Fall DeHon CS137: Electronic Design Automation Day 9: October 17, 2005 Fault Detection.
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Fundamentals of Fault-Tolerant Distributed Computing In Asynchronous Environments Paper by Felix C. Gartner Graeme Coakley COEN 317 November 23, 2003.
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
Project CS 116 Section 4 Deadline 04/28 11:59PM Points: 12.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
On Survivability of Mobile Cyber Physical Systems with Intrusion Detection Authors: Robert Mitchell, Ing-Ray Chen Presented by: Ting Hua.
Copyright 2007 Koren & Krishna, Morgan-Kaufman Part.4.1 FAULT TOLERANT SYSTEMS Part 4 – Analysis Methods Chapter 2 – HW Fault Tolerance.
Brian Thompson1,2, James Morris-King1,2, and Hasan Cam1
MPTCP Implementation: Use cases for Enhancement Opportunities
Enabling QoS Multipath Routing Protocol for Wireless Sensor Networks
Jamming for good: a fresh approach to authentic communication in WSNs
Chapter 4 Continuous Random Variables and Probability Distributions
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Coverage and Connectivity in Sensor Networks
Modeling Entropy in Onion Routing Networks
Presentation transcript:

Attacks and Counter Defense Mechanisms for Cyber-Physical Systems 1 Taha Hassan Lulu Wang CS 5214 Fall 2015

Overview ● Survivability of cyber-physical systems ● Failure types (attrition, pervasion, exfiltration) ● Case Study: Reliability in the electrical grid ● Optimal design conditions and tradeoffs 2

Survivability: System Model ●‘Smart’ grid conceptual model ●Centralized management nodes ●Sensors ●Distributed control nodes ●Actuators ●Communications Links 3

Survivability: Failure Types 4 ● Attrition failure (direct mission impact) ● Pervasion failure (direct means to damage) ● Exfiltration failure (secretion of grid data to instrument attack)

Survivability: Attacker Behavior 5 ● Surveilling attacker ● Long-term operations (trade secrets analogy) ● CM nodes, sensors, comm. links ● Need for discretion ● Destructive attacker ● Short-term disruption ● Actuators, CM nodes, control nodes ● Discretion not a concern

Survivability: Countermeasures 6 ● Intrusion detection ● P fnx, P fpx ● Optimal detection interval T IDS X ● Data leak rate control ● T TX, T sensing ● Redundancy ● Redundancy factor α x ● INIT x = MIN x ✕ α x

7 ●System behavior description based on SPN modeling ●Three devices represented by nodes: S,C,A Sensors, Control nodes and Actuators Performance Model

8 PATTRIT=1, sys. failure, too many C and A been evicted & compromised PLEAK=1, sys. failure, compromised S & C exfiltrating too much data PPERVADE=1, sys. failure, a high ratio of uncompromised C & A been compromised Performance Model

9

10 Performance Model

System initiation INITx nodes x ∈ {S,C,A}, for sensors, control nodes, and actuators, respectively. all nodes are uncompromised place PGOODx holds tokens one token representing one nodes 11 Performance Model: The first event

Transitions TCPx model this event: attacker Uncompromised nodes compromised TCPx: attacker compromises a device The time of this process: a random variable exponentially distributed Node: from good to malicious Place: node been moved from PGOODx to PBADx 12 Performance Model: The second event

The sys. 9-state representation (PATTRIT, PGOODS, PGOODC, PGOODA, PBADS, PBADC, PBADA, PLEAK, PPERVADE) If in state (0, ns, nc, na, 0, 0, 0, 0, 0), an uncompromised sensor node is compromised, a token will flow from PGOODS to PBADS, and the resulting state is (0, ns − 1, nc, na, 1, 0, 0, 0, 0). 13 Performance Model: The second event

Transitions TFPx model this event: Uncompromised nodes may be incorrectly evicted TFPx: the detection sys. IDS falsely detects a node Node: an uncompromised node be removed from place PGOODx Place: remove from PGOODx 14 Performance Model: The third event

15 The sys. 9-state representation (PATTRIT, PGOODS, PGOODC, PGOODA, PBADS, PBADC, PBADA, PLEAK, PPERVADE) If in state (0, ns, nc, na, 0, 0, 0, 0, 0) the IDS misdetects and evicts an uncompromised actuator, a token will flow from PGOODA, and the resulting state is (0, ns, nc, na − 1, 0, 0, 0, 0, 0). Performance Model: The third event

Transitions TIDx model this event: compromised nodes be correctly evicted TIDx: IDS correctedly detectes a compromised node as compromised Node: The # of unevicted compromised nodes - 1 Place: one token in place PBADx is to be removed 16 Performance Model: The fourth event

17 The sys. 9-state representation (PATTRIT, PGOODS, PGOODC, PGOODA, PBADS, PBADC, PBADA, PLEAK, PPERVADE) If in state (0, ns, nc−1, na, 0, 1, 0, 0, 0) the IDS detects and evicts a compromised control node, a token will flow from PBADC, and the resulting state is (0, ns, nc − 1, na, 0, 0, 0, 0, 0). Performance Model: The fourth event

Performance Model: The fifth event TATTRITx models the sys. attrition failure event TATTRITx: fired by EATTRITx, uncompromised control node count is lesser than the minimum count Node:one token set in place PATTRIT Place: PATTRIT When TATTRITx is enabled: the attrition failure condition is true enabling function returns true 18

Performance Model: The fifth event 19 Table V lists the enabling functions governing the firing of TATTRITx.

Performance Model: The fifth event 20 The sys. 9-state representation (PATTRIT, PGOODS, PGOODC, PGOODA, PBADS, PBADC, PBADA, PLEAK, PPERVADE) TCPx: a token been moved from PGOODx to PBADx TFPx: remove a token from PGOODx

Performance Model: The sixth event TPERVADEx models this sys. pervasion failure event TPERVADEx: fired by EPERVADEx, Byzantine failure condition applied to nodes Node: when nodes from PGOODx transimit to PBADx, when nodes are evicted from PGOODx Place: PERVADE set 1 Byzantine failure: when at least 1/3 of the control nodes or actuators are compromised (PBADx), the system suffers from a byzantine failure. 21

Performance Model: The sixth event 22 The enabling functions of TPERVADEx with x ∈ {C,A} are defined in TableV governing the firing of TPERVADEx.

Performance Model: The sixth event 23 The sys. 9-state representation (PATTRIT, PGOODS, PGOODC, PGOODA, PBADS, PBADC, PBADA, PLEAK, PPERVADE) TCPx: a token been moved from PGOODx to PBADx PPERVADE: placed by 1

Performance Model: The seventh event TLEAKx models this system exfiltration failure event TLEAKx: attacker secretes enough data about victim sensor/control node Node: Bad nodes (odes from PBADx) transmit the data out of the system, criminals hack the system and steal the intelligence away Place: PLEAK set 1 countermeasures: data leak rate controls 24

Performance Model: The seventh event 25 The sys. 9-state representation (PATTRIT, PGOODS, PGOODC, PGOODA, PBADS, PBADC, PBADA, PLEAK, PPERVADE) PLEAK: placed by 1

Performance Analysis ●Model Parameterization ●Results 26

Model Parameterization 27

Model Parameterization The parameters are from input and design parameters Design parameter is one that the system manager can choose. Input parameter is one that the operating environment dictates. λT means the transition rate of transition T 28

Model Parameterization 29

Model Parameterization: Physical explanations 30 TCPx: Attracker compromises a device |PGOODx| : the # of uncompromised nodes of device type x λx : the per-node compromise rate for device type x. The more uncompromised devices, the more compromise opportunities

Model Parameterization: Physical explanations 31 TIDx: IDS ( IDS, intrusion detection system) detects a compromised device : rate that bad nodes are detected and forced to leave the place correctly |PBADx| : the # of compromised nodes Pfnx : the false negative probability ( : the IDS detection interval In every TIDSx interval, 1−Pfnx = probability (a bad node be correctly identified as a bad node)

Model Parameterization: Physical explanations 32 TLEAKS: attacker secretes a substantial amount of victim sensor data λTLEAKS: the rate that TLEAKS transition happens the first term is for a compromised sensor node to rotate in for reporting sensing data the second term is for the rate at which sensing reporting occurs the third term is for the maximum number of leaks the system can tolerate before an exfiltration failure occurs MAXLEAKS : an input parameter, the maximum number of leaks the system can tolerate

Model Parameterization: Physical explanations 33 TLEAKC: attacker secretes a substantial amount of victim control node data T TX : the data transmission rate per node allowable MAXLEAKC : an input parameter, the maximum data amount leaked beyond which an exfiltration failure occurs

Model Parameterization: Physical explanations 34 TFPx: IDS falsely detects a device : the rate that good nodes suffer from false positives |PGOODx| : the # of uncompromised nodes : the false positive probability that a good node of type x will be misidentified as a bad node : the IDS detection interval

Results: Effects of detection interval T IDS X 35 ● P fn < P fp : Mislabeling healthy nodes more probable so lesser T IDSx implies faster monotonic failure ●Exfiltration and pervasion failures depend on the ‘bad node ratio’, hence an optimal MTTF at optimal node ratio

Results: Effects of false pos./neg. prob. T IDS X 36 ● P fp : Rate of mislabeling healthy nodes more probable so lesser T IDSx implies faster monotonic failure ●Similar trends for P fn. MTTF is less sensitive to it though.

Results: Effects of redundancy factor (α c ) T IDS X 37 ●Attrition and pervasion: redundancy improves MTTF (bad node ratio decreases with redundancy) ●Exfiltration: redundancy limits MTTF (Note that transition rate for TLEAKC changes with num_bad_nodes, for TLEAKS, it’s bad_node_ratio)

Questions. 38