Sunday, September 25, 2011
How do people do their research
Monday, August 15, 2011
paper writing
Trade-off study between security and efficiency in networked control system
In this paper, we will discuss how to define security and how to measure the efficiency by our metrics of a specific networked control system. Besides, we propose a relation between these two notions using convex optimization. At last, we get a trade-off between security and efficiency in networked control system using parametric programming and differential geometry.
How is this networked control system?
Metrics for security:
Related work first:
There are many ways to quantitatively differentiate or measure the system security, accurately. [Stuart Schechter] from Harvard uses the cost to break into a system as an effective metric from the start of testing until product retirement, to find out how hard it is for real people to break into a system. It is an economic way to estimate an upper bound and a lower bound for every unique security vulnerability. [R. Ortalo and Y. Deswarte] also presents a method based on the privilege graph model for quantitatively evaluation of the security of information system. It includes two levels. In its design level, it uses security policy to denote the security objectives and in its second level, it uses a pragmatic evaluation technique to achieve a good compromise between security and efficiency in the information system. They also have another paper to presents the results of an experiment in security evaluation and validates the measures[1]. [Lingyu Wang] proposes a method using attack graphs to measure the global security of a network. It tries to integrate the measurement for individual vulnerabilities, resources, and configurations into a global measure based on a particular context. With such method, it can also provide the missing information among network components so as to consider potential attacks and their consequence in the context. These approaches have proposed their ways to evaluate modern IT systems. But, they fail to quantitatively define both the efficiency and security metrics for networked control systems.
Metrics for efficiency:
Related work first:
Analyzing efficiency in networked control system has been started three decades ago. [2,T.C.Yang] in his survey, proposed that most of networked control systems improve their efficiency, flexibility and reliability through common-bus network, reduced wiring and distributed intelligence so as to reduce the installation, reconfiguration and maintenance time and costs. [Derek, Emeka, Jia] in their SimTool paper, they only focus on run-time efficiency of the networked UAV system. Under kinds of network situations, like nominal case, with lots of background traffic and multi-hop network, this paper uses the run-time to denotes its efficiency and compare them. [3] Mei proposes that with the increase of the sampling period, the data packet dropout has to be decreased, therefore, the efficiency of NCS is increased. In a qualitative way, increasing sampling rate will increase the load of network and thus deteriorate its performance. They all illustrate a way to increase efficiency of networked control system. However, same as notion of security, they don’t have a quantitative way to evaluate the “efficiency”.
Their relation:
Get a Trade-off:
Conclusion:
Reference:
[1] Rodolphe. Ortalo, Yves. Deswarte, Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security.
[2] T.C.Yang, Networked control system: a brief survey
[3] Mei Yu, Long Wang, Stabilization of Networked Control Systems with Data Packet Dropout and Transmission Delays: Continuous-Time Case
Friday, August 12, 2011
To do: a trade-off study between efficiency (performance) and security level in intrusion detection network system
Thursday, August 11, 2011
Weekly Summary 08/01~08/11
Four papers are:
Wednesday, August 10, 2011
rethinking about paper: network security configurations---a nonzero-sum stochastic game approach
Tuesday, August 9, 2011
To do: Game theory and implementation using Matlab
Monday, August 8, 2011
Game Theory meets Network Security and CPS
Monday, August 1, 2011
Find drawbacks of recent research on intrusion response
Thursday, July 28, 2011
Summary: Case study (experiments) related to intrusion response, security analysis
Tuesday, July 26, 2011
security analysis using Fault Trees (FT)
Monday, July 25, 2011
Combinatorial models
Friday, July 22, 2011
Weekly Summary
Wednesday, July 20, 2011
some existing intrusion response system
Tuesday, July 19, 2011
quantitatively measure the performance, dependability, perfomability and security
Monday, July 18, 2011
prospective research
Wednesday, July 13, 2011
an idea on intrusion response
Intrusion response and recovery
Tuesday, June 14, 2011
Control techniques in NCS
Paper Reading: Control methodologies in networked control systems
After reading paper “Simulation of Network Attacks on SCADA system”, I was thinking maybe I could do a series of simulation to analyze the effects of network attacks on NCS. Different from previous work, I was thinking to make two situations, one with full-fledged DoS attack on routers so that the network will be essentially broken at that point and result in a loss of regulatory function of the controller, complete loss of the communication between controller and plant; the other with only attacking some factors inside plant, not the whole plant, so that the controller is not blind to any of the required sensors, but its regulation function could be still hampered by it not being able to control all the factors in the plant. This requires a deep understanding on the NCS we are using in NCSWT. This is the idea coming from control perspective. Maybe I could make some change to the NCS to output some more factors or let it have some more input values besides x, y, id we already had. This is why I read thoroughly over control technique.
Some valued points got from this paper:
In the NCS research field, regardless of the type of network used, the overall NCS performance is always affected by network delays. This network delay (time-varying, constant, periodic) still significantly affects the close-loop system. And it requires an advanced control methodology. (Before that, I was thinking with the development of network today, network speed, network bandwidth is making this delay almost ignorable. It may not be necessary to make network delay as research object since it may not have a significant effect on NCS performance. I was wrong.)
This network delay is composed of sensor-to-controller delay and controller-to-actuator delay for all the NCS, including hierarchical structure (multiple control system with one or multiple main controller).
To be noted that, for the effects of delays in the close-loop control system, it only has two main effects. One is widely known to degrade system performances of a control system, such as higher overshoot and the longer settling time when the delays are longer than expected. The other one is to destabilize the system by reducing the system stability margin. There have been several studies to derive stability criteria for an NCS in order to guarantee that the NCS can remain stable in a certain condition. However, there is no generic stability analysis that can be applied on every NCS. I guess this could still use the frequency domain analysis for checking stability when the delays are added into the system.
For the control techniques used to solve this network delay problem, you have to maintain the stability of the system first and then try to maintain the performance of the system. Two methods were caught into the eyes:
Sampling time scheduling methodology, to appropriately select a sampling period for an NCS such that network delays do not significantly affect the control system performance;
Event based methodology, instead of using time, this method uses a system motion as the reference of the system.
To be continued…
Monday, June 13, 2011
Research fields in CPS
A brief history about CPS could make us have a good understanding on it. NSF awarded a five-year $5 million grant to a research project titled “ Science of Integration for Cyber-Physical Systems,”. This project is a joint effort of many research centers (Vandy, ND, General Motors Research and Development Center, UCB, Memphis). Vanderbilt will lead the project. It aims to develop the theory, methods and tools to build cps, by combining seamlessly the necessary heterogeneous computational and physical components. The Notre Dame team will be using the theoretical concepts such as passivity and symmetry to address system uncertainties and the interdependence of design concerns.
Also, by looking into the paper, I found that nowadays all the CPS research has a great real-world testbed, not just simulation. Even model designed CPS research has tried to build their testbed so as to evaluate its performance.
Two papers were taken a lot of thought when I'm reading.
A Testbed for Secure and Robust SCADA Systems
Simulation of Network Attacks on SCADA Systems
both of them were written by guys from ISIS. They claim that it is good to use C2WT as testbed for evaluation of effect by network attack over SCADA. By doing this, you have to know more about control system used in C2WT, how plant and controller are related. Considering NCS we are using is from Emeka's model, I'm asking for further reading from Emeka about this NCS.
Wednesday, June 1, 2011
Paper Reading on: Modeling Load Redistribution Attacks in Power Systems
Thursday, March 24, 2011
ToDo threat model in NCSWT
Thanks for these days work with newer version NCSWT. I'm now much familiar with C2WT.
We know the security goal that NCS should achieve lies in the order of importance, availability, integrity and confidentiality. How to select the appropriate security mechanisms requires a threat model first.
Threat taxonomy:
We could categorize the attacks into three main types:
1. outsider attacks. (This is where we focus)
--Deception attack (spoofing attack)
Using new version NCSWT, we could now easily change the values transmited between controller and plant by spoofed packets, causing it to perform undesired effects. I was thinking maybe could do several kinds of spoofing here. Try to find some more information. The analysis could be done offline by data from control system.
--Denial of Service attack (jamming attack)
Jamming is the interference with the Radio Frequency(RF) used by the nodes in a network. It makes use of the broadcast nature of the communication medium. We don't want to compromise the availability of network, just need to give the control network some more delay. Because if there is no network availability we can easily notice the attack and take some correct actions. There is no need to detect. I think it is meaningful that if we could detect out that there is a lot of traffic in the network and then launch an alarm. This could be done in the ns2, online. In simulation system, this kind of work has not been done before.
--Replay attack
In a replay attack, a transmitted packet is maliciously or fraudulently repeated or delayed by the adversary. I have an idea that this could also be done in NCSWT, by revising some code in ns2.
2. Key-compromise attacks.
Since low-entropy of certain measurement reports, confidentiality could be easily compromised by simple traffic analysis. So, most systems use encryption to ensure confidentiality. However, this secret key may be stole or compromised by adversary. We may not do this, since we don't do encryption in the first place.
3. Insider attacks.
adversary act as legitimate nodes in the network.
Saturday, February 19, 2011
whole background with security problem over CPS
from plant or controller. the false information could include: an incorrect measurement, the incorrect time when the measurement was observed, or the incorrect sender id. The adversary can launch these attack by compromising some sensors or controllers. I will try to realize it in ns2. Capture the package and then revise the data inside.
Friday, February 11, 2011
anomaly detection on NCS 02-11memo
For our today's discussion:
Take why anomaly detection should be used for networked control
system this kind of introduction aside, right now things need to be done
first are as follows:
1. Attack model
After all, this is for us to get the test data and ensure the accuracy
of our approach. Two model used here, one is DoS attack model which
could be easily implemented in network side. The other one is Deception
attack model, which will be implemented in controller side replacing the
reference signal with a small offset from our reference signal before.
At the same time, I will try to learn how to change content of package
in ns2, to do deception attack in this way.
2. Find Training set which is the normal data
Still have some questions here. At first, I have thought that this is an
off-line approach. I didn't deploy this model in Controller or Plant. So
the intuitive way is to get result from Plant directly and then analyze
it. I didn't quite understand. If we want to use the data from
Controller side, comparing its input with the Plant output, it has to be
an on-line detection way. Otherwise, the data obtained from Controller
after UAV done its work has no meaning I think.
And for "normal", means no attack on the network, but may still have
some data loss, network delay to cause some deviation from the reference
signal. But how do we decide this value? (The same as Threshold value. )
Since they all lead to a larger network delay with the same effect on
the Plant as DoS attack model does.
3. detection model
Still use the distance model to compute the deviation from test data to
nominal data
4. Detector
anomaly score compared with threshold value...
Thanks.