Team for Research in
Ubiquitous Secure Technology

NCS Security Experimentation Using DETER
Alefiya Hussain, Saurabh Amin

Citation
Alefiya Hussain, Saurabh Amin. "NCS Security Experimentation Using DETER". Proceedings of the 1st International ACM Conference on High Confidence Networked Systems (HiCoNS), April, 2012.

Abstract
Networked control systems (NCS) are increasingly being used for operational management of large-scale physical infrastructures, and inherit the vulnerabilities of commercial IT solutions. In recent years, numerous studies have focused on the study of interconnected physical and cyber-based processes of NCS and next-generation supervisory control and data acquisition (SCADA) systems. Especially important is the interdependence between random failures (e.g., due to sensor-actuator faults) and adversarial failures (e.g., due to malicious software). The existing theoretical analyses typically assume class of attacker-defender models, and rigorously use tools from robust control and game theory to derive safety and performance bounds for NCS models. However, in order to develop practically implementable diagnostic tools and real-time response mechanisms, these attacker-defender models should be benchmarked and evaluated against real-world threat scenarios. Indeed, experimental research in network security highlights the accuracy and level of modeling detail, and focuses on developing techniques for security evaluation by combining real and simulated components. Such experimental research is necessary to complement theoretical performance bounds, and will enable researchers to address new developments in smart infrastructures that face emerging threats, and yet account for the challenges of realism, fidelity, and scale as these networked systems expand in size and functionality.

Electronic downloads

Citation formats  
  • HTML
    Alefiya Hussain, Saurabh Amin. <a
    href="http://www.truststc.org/pubs/904.html"
    >NCS Security Experimentation Using DETER</a>,
    Proceedings of the 1st International ACM Conference on High
    Confidence Networked Systems (HiCoNS), April, 2012.
  • Plain text
    Alefiya Hussain, Saurabh Amin. "NCS Security
    Experimentation Using DETER". Proceedings of the 1st
    International ACM Conference on High Confidence Networked
    Systems (HiCoNS), April, 2012.
  • BibTeX
    @inproceedings{HussainAmin12_NCSSecurityExperimentationUsingDETER,
        author = {Alefiya Hussain and Saurabh Amin},
        title = {NCS Security Experimentation Using DETER},
        booktitle = {Proceedings of the 1st International ACM
                  Conference on High Confidence Networked Systems
                  (HiCoNS)},
        month = {April},
        year = {2012},
        abstract = {Networked control systems (NCS) are increasingly
                  being used for operational management of
                  large-scale physical infrastructures, and inherit
                  the vulnerabilities of commercial IT solutions. In
                  recent years, numerous studies have focused on the
                  study of interconnected physical and cyber-based
                  processes of NCS and next-generation supervisory
                  control and data acquisition (SCADA) systems.
                  Especially important is the interdependence
                  between random failures (e.g., due to
                  sensor-actuator faults) and adversarial failures
                  (e.g., due to malicious software). The existing
                  theoretical analyses typically assume class of
                  attacker-defender models, and rigorously use tools
                  from robust control and game theory to derive
                  safety and performance bounds for NCS models.
                  However, in order to develop practically
                  implementable diagnostic tools and real-time
                  response mechanisms, these attacker-defender
                  models should be benchmarked and evaluated against
                  real-world threat scenarios. Indeed, experimental
                  research in network security highlights the
                  accuracy and level of modeling detail, and focuses
                  on developing techniques for security evaluation
                  by combining real and simulated components. Such
                  experimental research is necessary to complement
                  theoretical performance bounds, and will enable
                  researchers to address new developments in smart
                  infrastructures that face emerging threats, and
                  yet account for the challenges of realism,
                  fidelity, and scale as these networked systems
                  expand in size and functionality.},
        URL = {http://www.truststc.org/pubs/904.html}
    }
    

Posted by Larry Rohrbough on 23 May 2012.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.