Configurable middleware-level intrusion detection for embedded systems

被引:6
|
作者
Næss, E [1 ]
Frincke, DA [1 ]
McKinnon, AD [1 ]
Bakken, DE [1 ]
机构
[1] Washington State Univ, Pullman, WA 99164 USA
关键词
D O I
10.1109/ICDCSW.2005.52
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded systems have become integral parts of a diverse range of systems. Unfortunately, research on embedded system security, in general, and intrusion detection, in particular, has not kept pace. Embedded systems are, by nature, application specific and therefore frameworks for developing application-specific intrusion detection systems for distributed embedded systems must be researched, designed, and implemented. In this paper, we present a configurable middleware-based intrusion detection framework. First, we present a system model and a concrete implementation of a highly configurable intrusion detection framework that is integrated into MicroQoSCORBA, a highly configurable middleware framework developed for embedded systems. Our framework autogenerates application-specific intrusion detection systems by exploiting application-specific information accessible to the middleware framework (e.g., object interfaces and method signatures). Next, a set of configurable intrusion detection mechanisms suitable for embedded systems is presented. A performance evaluation of these mechanisms, is presented at the end of the paper.
引用
下载
收藏
页码:144 / 151
页数:8
相关论文
共 50 条
  • [41] ORB middleware evolution for networked embedded systems
    Gill, C
    Subramonian, V
    Parsons, J
    Huang, HM
    Torri, S
    Niehaus, D
    Stuart, D
    EIGHTH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, PROCEEDINGS, 2003, : 169 - 176
  • [42] Middleware for real-time and embedded systems
    Schmidt, DC
    COMMUNICATIONS OF THE ACM, 2002, 45 (06) : 43 - 48
  • [43] A Fast and Configurable Pattern Matching Hardware Architecture for Intrusion Detection
    Liu, Yizhen
    Xu, Daxiong
    Liu, Dong
    Sun, Lingge
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 614 - +
  • [44] Intrusion detection for resource-constrained embedded control systems in the power grid
    Reeves, Jason
    Ramaswamy, Ashwin
    Locasto, Michael
    Bratus, Sergey
    Smith, Sean
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2012, 5 (02) : 74 - 83
  • [45] Intrusion detection systems - Introduction to intrusion detection and analysis
    Debar, H
    SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 161 - 177
  • [46] INTRUSION DETECTION SYSTEMS
    WILLIAMS, JD
    TRANSACTIONS OF THE AMERICAN NUCLEAR SOCIETY, 1979, 33 (NOV): : 733 - 734
  • [47] Intrusion detection systems
    IEEE Intelligent Systems and Their Applications, 2001, 16 (01):
  • [48] Configurable hybridkernel for embedded real-time systems
    Kerstan, Timo
    Oberthuer, Simon
    EMBEDDED SYSTEM DESIGN: TOPICS, TECHNIQUES AND TRENDS, 2007, 231 : 279 - +
  • [49] Configurable Middleware for Distributed Real-Time Systems with Aperiodic and Periodic Tasks
    Zhang, Yuanfang
    Gill, Christopher D.
    Lu, Chenyang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2010, 21 (03) : 393 - 404
  • [50] System-level middleware for embedded hardware and software communication
    Rincon, Fernando
    Barba, Jesus
    Moya, Francisco
    Villanueva, Felix J.
    Villa, David
    Dondo, Julio
    Carlos Lopez, Juan
    PROCEEDINGS OF THE FIFTH WORKSHOP ON INTELLIGENT SOLUTIONS IN EMBEDDED SYSTEMS, 2007, : 131 - 142