Barriers to the use of intrusion detection systems in safety-critical applications

Chris W. Johnson*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Citations (Scopus)

Abstract

Intrusion detection systems (IDS) provide valuable tools to monitor for, and militate against, the impact of cyber-attacks. However, this paper identifies a range of theoretical and practical concerns when these software systems are integrated into safety-critical applications. Whitelist approaches enumerate the processes that can legitimately exploit system resources. Any other access requests are interpreted to indicate the presence of malware. Whitelist approaches cannot easily be integrated into safety-related systems where the use of legacy applications and Intellectual Property (IP) barriers associated with the extensive use of sub-contracting make it different to enumerate the resource requirements for all valid processes. These concerns can lead to a high number of false positives. In contrast, blacklist intrusion detection systems characterize the behavior of known malware. In order to be effective, blacklist IDS must be updated at regular intervals as new forms of attack are identified. This raises enormous concerns in safety-critical environments where extensive validation and verification requirements ensure that software updates must be rigorously tested. In other words, there is a concern that the IDS update might itself introduce bugs into a safety-related system. Isolation between an IDS and a safety related application minimizes this threat. For instance, information diodes limit interference by ensuring that an IDS is restricted to read-only access on a safety related network. Further problems arise in determining what to do when an IDS identifies a possible attack, given that false positives can increase risks to the public during an emergency shutdown.

Original languageEnglish
Title of host publicationComputer Safety, Reliability, and Security - 34th International Conference, SAFECOMP 2015, Proceedings
EditorsFloor Koornneef, Coen van Gulijk
PublisherSpringer Verlag
Pages375-384
Number of pages10
ISBN (Print)9783319242545
DOIs
Publication statusPublished - 2015
Externally publishedYes
Event34th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2015 - Delft, Netherlands
Duration: 23 Sept 201525 Sept 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9337
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference34th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2015
Country/TerritoryNetherlands
CityDelft
Period23/09/1525/09/15

Fingerprint

Dive into the research topics of 'Barriers to the use of intrusion detection systems in safety-critical applications'. Together they form a unique fingerprint.

Cite this