Skip to main content

Barriers to the Use of Intrusion Detection Systems in Safety-Critical Applications

  • Conference paper
  • First Online:
Computer Safety, Reliability, and Security (SAFECOMP 2014)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9337))

Included in the following conference series:

Abstract

Intrusion detection systems (IDS) provide valuable tools to monitor for, and militate against, the impact of cyber-attacks. However, this paper identifies a range of theoretical and practical concerns when these software systems are integrated into safety-critical applications. Whitelist approaches enumerate the processes that can legitimately exploit system resources. Any other access requests are interpreted to indicate the presence of malware. Whitelist approaches cannot easily be integrated into safety-related systems where the use of legacy applications and Intellectual Property (IP) barriers associated with the extensive use of sub-contracting make it different to enumerate the resource requirements for all valid processes. These concerns can lead to a high number of false positives. In contrast, blacklist intrusion detection systems characterize the behavior of known malware. In order to be effective, blacklist IDS must be updated at regular intervals as new forms of attack are identified. This raises enormous concerns in safety-critical environments where extensive validation and verification requirements ensure that software updates must be rigorously tested. In other words, there is a concern that the IDS update might itself introduce bugs into a safety-related system. Isolation between an IDS and a safety related application minimizes this threat. For instance, information diodes limit interference by ensuring that an IDS is restricted to read-only access on a safety related network. Further problems arise in determining what to do when an IDS identifies a possible attack, given that false positives can increase risks to the public during an emergency shutdown.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adelstein, F.: Live forensics: diagnosing your system without killing it first. Commun. ACM 49(2), 63–66 (2006)

    Article  Google Scholar 

  2. Sutherland, I., Evans, J., Tryfonas, T., Blyth, A.: Acquiring volatile operating system data tools and techniques. SIGOPS Oper. Syst. Rev. 42(3), 65–73 (2008)

    Article  Google Scholar 

  3. European Network and Information Security Agency (ENISA): Technical Guidelines on Reporting Incidents: Article 13a Implementation, Heraklion, Greece, December 2011

    Google Scholar 

  4. US Government Auditors Office: Information Security: FAA Needs to Address Weaknesses in Air Traffic Control Systems, GAO-15-221, 29 January 2015

    Google Scholar 

  5. Naedele, M.: Addressing IT security for critical control systems. In: Proceedings of the 40th Hawaii International Conference on System Sciences. IEEE Computer Society (2007)

    Google Scholar 

  6. Johnson, C.W.: Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures. Ergonomics 57(3), 419–433 (2014)

    Article  Google Scholar 

  7. Johnson, C.W.: Inadequate legal, regulatory and technical guidance for the forensic analysis of cyber-attacks on safety-critical software. In: Swallom, D. (ed.) Proceedings of the 32nd International Systems Safety Society, Louisville, USA. International Systems Safety Society, Unionville (2014)

    Google Scholar 

  8. Garfinkel, S.L.: Digital forensics research: the next 10 years. Digital Invest. 7, 64–73 (2010)

    Article  Google Scholar 

  9. Nilsson, D.K., Larson, U.E.: Conducting forensic investigations of cyber attacks on automobile in-vehicle networks. In: Proceedings of eForensics 2008, Proceedings of the 1st International Conference in Forensic Applications. ACM (2008)

    Google Scholar 

  10. Jones, R.A., Horowitz, B.: A system-aware cyber security architecture. Syst. Eng. 15(2), 225–240 (2012)

    Article  Google Scholar 

  11. U.S. National Institute of Standards and Technology (NIST): Computer Security Incident Handling Guide (Draft), Special Publication 800-61 Revision 2 (Draft), Gaithersburg, Maryland (2012)

    Google Scholar 

  12. U.S. National Institute of Standards and Technology (NIST): Guide to Integrating Forensic Techniques into Incident Response, Special Publication 800-86, Gaithersburg, Maryland (2006)

    Google Scholar 

  13. DigitalBond SCADA intrusion detection forum. http://www.digitalbond.com/support-center/. Accessed March 2015

  14. Australian Signals Directorate: Application Whitelisting Explained. Australian Government, Department of Defense (2012)

    Google Scholar 

  15. Anderson, D., Khiabani, H.: Protect critical infrastructure computer systems with whitelisting. The SANS Institute, Bethesda (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chris W. Johnson .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Johnson, C.W. (2015). Barriers to the Use of Intrusion Detection Systems in Safety-Critical Applications. In: Koornneef, F., van Gulijk, C. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2014. Lecture Notes in Computer Science(), vol 9337. Springer, Cham. https://doi.org/10.1007/978-3-319-24255-2_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24255-2_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24254-5

  • Online ISBN: 978-3-319-24255-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics