Sciweavers

Share
CCS
2015
ACM

Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems

3 years 8 months ago
Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems
In order to be resilient to attacks, a cyber-physical system (CPS) must be able to detect attacks before they can cause significant damage. To achieve this, intrusion detection systems (IDS) may be deployed, which can detect attacks and alert human operators, who can then intervene. However, the resource-constrained nature of many CPS poses a challenge, since reliable IDS can be computationally expensive. Consequently, computational nodes may not be able to perform intrusion detection continuously, which means that we have to devise a schedule for performing intrusion detection. While a uniformly random schedule may be optimal in a purely cyber system, an optimal schedule for protecting CPS must also take into account the physical properties of the system, since the set of adversarial actions and their consequences depend on the physical systems. Here, in the context of water distribution networks, we study IDS scheduling problems in two settings and under the constraints on the avai...
Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, X
Added 17 Apr 2016
Updated 17 Apr 2016
Type Journal
Year 2015
Where CCS
Authors Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos
Comments (0)
books