Barriers to the Use of Intrusion Detection Systems in Safety-Critical Applications

被引:4
|
作者
Johnson, Chris W. [1 ]
机构
[1] Univ Glasgow, Sch Comp Sci, Glasgow G12 8RZ, Lanark, Scotland
关键词
SCADA; Intrusion detection; Safety; Cyber-security;
D O I
10.1007/978-3-319-24255-2_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems (IDS) provide valuable tools to monitor for, and militate against, the impact of cyber-attacks. However, this paper identifies a range of theoretical and practical concerns when these software systems are integrated into safety-critical applications. Whitelist approaches enumerate the processes that can legitimately exploit system resources. Any other access requests are interpreted to indicate the presence of malware. Whitelist approaches cannot easily be integrated into safety-related systems where the use of legacy applications and Intellectual Property (IP) barriers associated with the extensive use of sub-contracting make it different to enumerate the resource requirements for all valid processes. These concerns can lead to a high number of false positives. In contrast, blacklist intrusion detection systems characterize the behavior of known malware. In order to be effective, blacklist IDS must be updated at regular intervals as new forms of attack are identified. This raises enormous concerns in safety-critical environments where extensive validation and verification requirements ensure that software updates must be rigorously tested. In other words, there is a concern that the IDS update might itself introduce bugs into a safety-related system. Isolation between an IDS and a safety related application minimizes this threat. For instance, information diodes limit interference by ensuring that an IDS is restricted to read-only access on a safety related network. Further problems arise in determining what to do when an IDS identifies a possible attack, given that false positives can increase risks to the public during an emergency shutdown.
引用
收藏
页码:375 / 384
页数:10
相关论文
共 50 条
  • [1] Use of modern processors in safety-critical applications
    Bate, I.
    Conmy, P.
    Kelly, T.
    McDermid, J.
    1600, Oxford University Press (44):
  • [2] Use of modern processors in safety-critical applications
    Bate, I
    Conmy, P
    Kelly, T
    McDermid, J
    COMPUTER JOURNAL, 2001, 44 (06): : 531 - 543
  • [3] Fault detection in safety-critical embedded systems
    Verber, D
    Colnaric, M
    Halang, WA
    DESIGN AND ANALYSIS OF DISTRIBUTED EMBEDDED SYSTEMS, 2002, 91 : 113 - 119
  • [4] Decision Tree-Based Rule Derivation for Intrusion Detection in Safety-Critical Automotive Systems
    Buschlinger, Lucas
    Rieke, Roland
    Sarda, Sanat
    Krauss, Christoph
    30TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2022), 2022, : 246 - 254
  • [5] THE USE OF MULTICHIP MODULES IN SAFETY-CRITICAL SYSTEMS
    ROUGHTON, M
    HINDE, G
    ELECTRONIC ENGINEERING, 1994, 66 (809): : 35 - &
  • [6] SAFETY-CRITICAL SYSTEMS
    MCDERMID, JA
    THEWLIS, DJ
    SOFTWARE ENGINEERING JOURNAL, 1991, 6 (02): : 35 - 35
  • [7] SAFETY-CRITICAL SYSTEMS
    RUDALL, BH
    ROBOTICA, 1990, 8 : 184 - 184
  • [8] DIGITAL-SYSTEMS - REVIEW OF SAFETY-CRITICAL APPLICATIONS
    IVES, G
    NUCLEAR ENGINEERING INTERNATIONAL, 1994, 39 (477): : 37 - 40
  • [9] Architectural concepts for embedded systems in safety-critical applications
    Skambraks, Martin
    Halang, Wolfgang A.
    2008 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR 2008), THETA 16TH EDITION, VOL I, PROCEEDINGS, 2008, : 60 - 65
  • [10] EXTENDING SYSTEMS ENGINEERING FOR SAFETY-CRITICAL DEFENCE APPLICATIONS
    Katia, P.O.T.I.R.O.N.
    James, I.N.G.E.
    INCOSE International Symposium, 2024, 34 (01) : 199 - 209