Title | ||
---|---|---|
A General Real-Time Control Approach of Intrusion Response for Industrial Automation Systems. |
Abstract | ||
---|---|---|
Intrusion response is a critical part of security protection. Compared with IT systems, industrial automation systems (IASs) have greater timeliness and availability demands. Real-time security policy enforcement of intrusion response is a challenge facing intrusion response for IASs. Inappropriate enforcement of the security policy can influence normal operation of the control system, and the loss caused by this security policy may even exceed that caused by cyberattacks. However, existing research about intrusion response focuses on security policy decisions and ignores security policy execution. This paper proposes a general, real-time control approach based on table-driven scheduling of intrusion response in IASs to address the problem of security policy execution. Security policy consists of a security service group, with each type of security service supported by a realization task set. Realization tasks from several task sets can be combined to form a response task set. In the proposed approach, first, a response task set is generated by a nondominated sorting genetic algorithm (GA) II with joint consideration of security performance and cost. Then, the system is reconfigured through an integrated scheduling scheme where system tasks and response tasks are mapped and scheduled together based on a GA. Furthermore, results from both numerical simulations and a real-application simulation show that the proposed method can implement the security policy in time with little effect on the system. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1109/TSMC.2015.2469688 | IEEE Trans. Systems, Man, and Cybernetics: Systems |
Keywords | Field | DocType |
Real-time systems,Job shop scheduling,Automation,Optimization,Computer crime | Security testing,Network security policy,Computer science,Computer security,Covert channel,Security service,Cloud computing security,Security policy,Security information and event management,Computer security model,Distributed computing | Journal |
Volume | Issue | ISSN |
46 | 8 | 2168-2216 |
Citations | PageRank | References |
2 | 0.57 | 41 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Shuang Huang | 1 | 31 | 4.09 |
Shuang Huang | 2 | 31 | 4.09 |
Chunjie Zhou | 3 | 79 | 20.11 |
Naixue Xiong | 4 | 2413 | 194.61 |
Yuanqing Qing | 5 | 118 | 12.20 |
Qi Zhang | 6 | 126 | 22.44 |