Safety Envelope for Security

,

Citation

Tiwari, A., Dutertre, B., Jovanovi, D., de Candia, T., Lincoln, P. D., Rushby, J., . . . Seshia, S. (2014, 15-17 April). Safety envelope for security. Paper presented at the International Conference on High Confidence Networked Systems (HiCoNS ’14), Berlin, Germany.

Abstract

We present an approach for detecting sensor spoofing attacks on a cyber-physical system. Our approach consists of two steps. In the first step, we construct a safety envelope of the system. Under nominal conditions (that is, when there are no attacks), the system always stays inside its safety envelope. In the second step, we build an attack detector: a monitor that executes synchronously with the system and raises an alarm whenever the system state falls outside the safety envelope. We synthesize safety envelopes using a modifed machine learning procedure applied on data collected from the system when it is not under attack. We present experimental results that show effectiveness of our approach, and also validate the several novel features that we introduced in our learning procedure.

Index terms:

  1. Computing methodologies
    1. Machine learning
      1. Machine learning approaches
        1. Factorization methods
          1. Canonical correlation analysis
  2. Information systems
    1. Data management systems
      1. Middleware for databases
        1. Distributed transaction monitors
  3. Mathematics of computing
    1. Probability and statistics
      1. Statistical paradigms
        1. Regression analysis

Read more from SRI