|
" T-Pack, Timed Network Security in Real Time System "
Mittal, Swastik
Yu, Ruozhou
Document Type
|
:
|
Latin Dissertation
|
Language of Document
|
:
|
English
|
Record Number
|
:
|
1110801
|
Doc. No
|
:
|
TLpq2491966687
|
Main Entry
|
:
|
Mittal, Swastik
|
|
:
|
Yu, Ruozhou
|
Title & Author
|
:
|
T-Pack, Timed Network Security in Real Time System\ Mittal, SwastikYu, Ruozhou
|
College
|
:
|
North Carolina State University
|
Date
|
:
|
2020
|
student score
|
:
|
2020
|
Degree
|
:
|
M.Sc.
|
Page No
|
:
|
48
|
Abstract
|
:
|
Real-time systems are widely deployed as cyber-physical systems to control physical processes with timing requirements in a networked environment, i.e., as distributed systems. Purpose of realization as a distributed system ranges from providing fault tolerance, remote monitoring, coordination with other distributed control processes to data processing of networked sensors and actuators. Exposure to network communication between real-time control systems raises system vulnerability to malware attacks over the network, e.g., man-in-the-middle attacks, data corruption, denial of service and eavesdropping. Such attacks require code injection of malware into the system, which results in alteration not only of system behavior via hijacked execution control but also incurs timing dilation to plant the injected code or, in case of network attacks, to drop, add, reroute, or modify packets before they reach their target. This work proposes to use the time overhead added by such cyber attacks to detect malware intrusion in cyber-physical real-time systems. A new method of timed packet protection, T-Pack, analyzes end-to-end transmission times of packets and detects a compromised system or network based on deviation of observed time from the expected time.Malware intrusion detection is demonstrated by observing timing constraints with and without a compromised network. First, a custom header is introduced to each packet to store timing information calculated to reflect end-to-end transmission times. Second, real-time application scenarios are analyzed in terms of their susceptibility to malware attacks. Results are evaluated on a distributed system of embedded platforms running a Preempt RT Linux kernel to demonstrate the real-time capability of our work.
|
Subject
|
:
|
Computer science
|
| |