Investigating Process-Aware Attack Detection on Embedded Systems
dc.contributor.author | HELLQVIST, ALBIN | |
dc.contributor.author | OVERLAND, ALBERT | |
dc.contributor.department | Chalmers tekniska högskola / Institutionen för data och informationsteknik | sv |
dc.contributor.examiner | Jonsson, Erland | |
dc.contributor.supervisor | Almgren, Magnus | |
dc.date.accessioned | 2019-07-11T07:40:42Z | |
dc.date.available | 2019-07-11T07:40:42Z | |
dc.date.issued | 2019 | sv |
dc.date.submitted | 2019 | |
dc.description.abstract | In many industrial settings, there are multiple processes that need to be monitored and controlled. Examples of such processes include controlling the flow of water in a hydroelectric plant or managing the temperature in an industrial water boiler. The systems supervising these processes are called Industrial Control Systems (ICSs). In some cases, ICSs are in control of critical infrastructure which makes them a worthwhile or profitable target for adversaries. Furthermore, ICSs are increasingly becoming targets of cyber attacks due to their increased network connectivity and integration into previously isolated systems. In addition, the advent of Internet of Things (IoT) increases the number of systems that can be targeted by similar cyber attacks. Since ICSs encompass a variety of different applications, each having its specific requirements, current methods of detecting attacks are oftentimes application-specific and not scalable. In response to the increased need for application-agnostic security, attack-detection methods with the capability of only using sensory data for detecting attacks have recently been proposed in the literature. These recently proposed attack-detection methods are to be run in ICS or IoT environments where power consumption is of concern in addition to limited hardware resources. Consequently, the scope and the aim of this thesis is to implement and evaluate one of these recent types of methods on a resource-constrained embedded system. For this task, a state-of-the-art attack-detection method was chosen together with a suitable embedded system on which the method was implemented. Additionally, a test environment consisting of three different sensors was set up in order to have real data for the evaluation of the system. The results show that the chosen attack-detection method is able to detect various types of attacks in real time when running on the resource-constrained embedded system. Furthermore, by tweaking certain parameters, the method could possibly run on less powerful embedded systems or with better resource utilization. Additionally, the results show that the embedded system, together with the attack-detection method, can potentially be used in resource-constrained ICS or IoT environments to detect attacks in real time. | sv |
dc.identifier.coursecode | DATX05 | sv |
dc.identifier.uri | https://hdl.handle.net/20.500.12380/300041 | |
dc.language.iso | eng | sv |
dc.setspec.uppsok | Technology | |
dc.subject | Industrial control systems | sv |
dc.subject | Internet of Things | sv |
dc.subject | computer security | sv |
dc.subject | intrusion detection system | sv |
dc.subject | anomaly-based attack detection | sv |
dc.subject | embedded systems | sv |
dc.subject | microcontroller | sv |
dc.subject | resource-constrained devices | sv |
dc.title | Investigating Process-Aware Attack Detection on Embedded Systems | sv |
dc.type.degree | Examensarbete för masterexamen | sv |
dc.type.uppsok | H | |
local.programme | Computer systems and networks (MPCSN), MSc |
Ladda ner
Original bundle
1 - 1 av 1
Hämtar...
- Namn:
- CSE 19-25 Hellqvist Overland.pdf
- Storlek:
- 7.8 MB
- Format:
- Adobe Portable Document Format
- Beskrivning:
- CSE Hellqvist, Albin & Overland, Albert
License bundle
1 - 1 av 1
Hämtar...
- Namn:
- license.txt
- Storlek:
- 1.14 KB
- Format:
- Item-specific license agreed upon to submission
- Beskrivning: