Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems - Critical Infrastructure Protection V Access content directly
Conference Papers Year : 2011

Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems

Abstract

Securing embedded control systems presents a unique challenge. In addition to the resource restrictions inherent to embedded devices, embedded control systems must accommodate strict, non-negotiable timing requirements, and their massive scale greatly increases other costs such as power consumption. These constraints render conventional host-based intrusion detection – using a hypervisor to create a safe environment under which a monitoring entity can operate – costly and impractical.This paper describes the design and implementation of Autoscopy, an experimental host-based intrusion detection system that operates from within the kernel and leverages its built-in tracing framework to identify control flow anomalies that are often caused by rootkits hijacking kernel hooks. Experimental tests demonstrate that Autoscopy can detect representative control flow hijacking techniques while maintaining a low performance overhead.
Fichier principal
Vignette du fichier
978-3-642-24864-1_3_Chapter.pdf (288.41 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01571779 , version 1 (03-08-2017)

Licence

Attribution

Identifiers

Cite

Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, Sean Smith. Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems. 5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. pp.31-46, ⟨10.1007/978-3-642-24864-1_3⟩. ⟨hal-01571779⟩
192 View
233 Download

Altmetric

Share

Gmail Facebook X LinkedIn More