Title
A General Real-Time Control Approach of Intrusion Response for Industrial Automation Systems.
Abstract
Intrusion response is a critical part of security protection. Compared with IT systems, industrial automation systems (IASs) have greater timeliness and availability demands. Real-time security policy enforcement of intrusion response is a challenge facing intrusion response for IASs. Inappropriate enforcement of the security policy can influence normal operation of the control system, and the loss caused by this security policy may even exceed that caused by cyberattacks. However, existing research about intrusion response focuses on security policy decisions and ignores security policy execution. This paper proposes a general, real-time control approach based on table-driven scheduling of intrusion response in IASs to address the problem of security policy execution. Security policy consists of a security service group, with each type of security service supported by a realization task set. Realization tasks from several task sets can be combined to form a response task set. In the proposed approach, first, a response task set is generated by a nondominated sorting genetic algorithm (GA) II with joint consideration of security performance and cost. Then, the system is reconfigured through an integrated scheduling scheme where system tasks and response tasks are mapped and scheduled together based on a GA. Furthermore, results from both numerical simulations and a real-application simulation show that the proposed method can implement the security policy in time with little effect on the system.
Year
DOI
Venue
2016
10.1109/TSMC.2015.2469688
IEEE Trans. Systems, Man, and Cybernetics: Systems
Keywords
Field
DocType
Real-time systems,Job shop scheduling,Automation,Optimization,Computer crime
Security testing,Network security policy,Computer science,Computer security,Covert channel,Security service,Cloud computing security,Security policy,Security information and event management,Computer security model,Distributed computing
Journal
Volume
Issue
ISSN
46
8
2168-2216
Citations 
PageRank 
References 
2
0.57
41
Authors
6
Name
Order
Citations
PageRank
Shuang Huang1314.09
Shuang Huang2314.09
Chunjie Zhou37920.11
Naixue Xiong42413194.61
Yuanqing Qing511812.20
Qi Zhang612622.44