首页 | 本学科首页   官方微博 | 高级检索  
     检索      


A Host Intrusion Detection System architecture for embedded industrial devices
Authors:Cyntia Vargas Martinez  Birgit Vogel-Heuser
Institution:1. Bosch Rexroth AG, Bürgermeister Dr-Nebelstr. 2, Lohr am Main 97819, Germany;2. Institute of Automation and Information Systems, Technische Universität München, Garching D-85748, Germany;1. Centre for Artificial Intelligence Technology, Universiti Kebangsaan Malaysia, 43600 Bangi, Malaysia;2. Centre for Cyber Security, Universiti Kebangsaan Malaysia, 43600 Bangi, Malaysia;1. College of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China;2. Institute of Electromechanical Engineering, Beijing Polytechnic, Beijing 100176, China
Abstract:The integration of Cyber-Physical Systems in the industrial domain has become indispensable for Industry 4.0. Unfortunately, as the interconnectivity among them increases, so do the opportunities for malicious users to target them. Hence, it is necessary to increase the security of these systems and their components. A wide range of security solutions (e.g., industrial Firewalls) are already an integral part of Industrial Automation Systems, however, these are deployed at strategical system locations and might not be capable of identifying intrusions that target specific elements of embedded industrial devices. Host Intrusion Detection Systems (Host IDS) are one security solution that allow to detect such type of intrusions, as they analyze information related to specific host devices. This contribution presents a feasible Host IDS architecture for embedded industrial devices. This architecture takes into consideration features and capabilities of Host IDS from the IT domain. It also considers system-, environmental- and device-specific properties from the industrial domain. These properties are presented in the form of abstracted requirements and considerations that are contemplated for the conceptualization of the presented architecture. Furthermore, the feasibility of this architecture is validated through the implementation and evaluation of a prototypical Host IDS deployed in a Programmable Logic Controller (PLC) hosting a Real-Time Operating System (RTOS). This evaluation is achieved through the demonstration of a set of hypotheses derived from the abstracted requirements and supported by the evaluation of test scenarios. To the best of our knowledge, this is the first fully operational Host IDS to be deployed and evaluated on a PLC.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号