Flexible Intrusion Detection Systems for Memory-Constrained Embedded Systems

被引:8
|
作者
Tabrizi, Farid Molazem [1 ]
Pattabiraman, Karthik [1 ]
机构
[1] Univ British Columbia, Sch Elect & Comp Engn, Vancouver, BC, Canada
关键词
IDS; selective monitoring; memory constraints;
D O I
10.1109/EDCC.2015.17
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded systems are widely used in critical situations and hence, are targets for malicious users. Researchers have demonstrated successful attacks against embedded systems used in power grids, modern cars, and medical devices. This makes building Intrusion Detection Systems (IDS) for embedded devices a necessity. However, embedded devices have constraints (such as limited memory capacity) that make building IDSes monitoring all their security properties challenging. In this paper, we formulate building IDS for embedded systems as an optimization problem. Having the set of the security properties of the system and the invariants that verify those properties, we build an IDS that maximizes the coverage for the security properties, with respect to the available memory. This allows our IDS to be applicable to a wide range of embedded devices with different memory capacities. In our formulation users may define their own coverage criteria for the security properties. We also propose two coverage criteria and build IDSes based on them. We implement our IDSes for SegMeter, an open source smart meter. Our results show that our IDSes provide a high detection rate in spite of memory constraints of the system. Further, the detection rate of our IDSes at runtime are close to their estimated coverage at design time. This validates our approach in quantifying the coverage of our IDSes and optimizing them.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [1] Middleware specialization for memory-constrained networked embedded systems
    Subramonian, V
    Xing, GL
    Gill, C
    Lu, CY
    Cytron, R
    [J]. RTAS 2004: 10TH IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2004, : 306 - 313
  • [2] DaCapo: An On-Device Learning Scheme for Memory-Constrained Embedded Systems
    Khan, Osama
    Park, Gwanjong
    Seo, Euiseong
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2023, 22 (05)
  • [3] Linear-Feedback Shift Register Seed Determination for Memory-Constrained Embedded Systems
    Puga, Gerardo L.
    [J]. 2017 IEEE URUCON, 2017,
  • [4] Improving Java']Java virtual machine reliability for memory-constrained embedded systems.
    Chen, GY
    Kandemir, M
    [J]. 42nd Design Automation Conference, Proceedings 2005, 2005, : 690 - 695
  • [5] The Interval Page Table: Virtual Memory Support in Real-Time and Memory-Constrained Embedded Systems
    Zhou, Xiangrong
    Petrov, Peter
    [J]. SBCCI2007: 20TH SYMPOSIUM ON INTEGRATED CIRCUITS AND SYSTEMS DESIGN, 2007, : 294 - 299
  • [6] On-NAS: On-Device Neural Architecture Search on Memory-Constrained Intelligent Embedded Systems
    Kim, Bosung
    Lee, Seulki
    [J]. PROCEEDINGS OF THE 21ST ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, SENSYS 2023, 2023, : 152 - 166
  • [7] LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS
    Reeves, Jason
    Ramaswamy, Ashwin
    Locasto, Michael
    Bratus, Sergey
    Smith, Sean
    [J]. CRITICAL INFRASTRUCTURE PROTECTION V, 2011, 367 : 31 - 46
  • [8] Partitioning Sporadic Task Systems upon Memory-Constrained Multiprocessors
    Baruah, Sanjoy
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2013, 12 (03)
  • [9] VOICE TO ACTION : SPOKEN LANGUAGE UNDERSTANDING FOR MEMORY-CONSTRAINED SYSTEMS
    Gupta, Ashutosh
    Jayasimha, Aditya
    Maghan, Aman
    Singh, Shatrughan
    Gowda, Dhananjaya
    Kim, Chanwoo
    [J]. 2021 IEEE AUTOMATIC SPEECH RECOGNITION AND UNDERSTANDING WORKSHOP (ASRU), 2021, : 473 - 479
  • [10] Motion Vector Search Window Prediction in Memory-Constrained Systems
    Lou, Chung-Cheng
    Lee, Szu-Wei
    Kuo, C. -C. Jay
    [J]. APPLICATIONS OF DIGITAL IMAGE PROCESSING XXXII, 2009, 7443