17
Tuan Vuong, George Loukas and Diane Gan University of Greenwich, London, UK WIFS 2015 Tuan Vuong 1 Cyber-physical intrusion detection on a robotic vehicle The 7th IEEE International Workshop on Information Forensics and Security Rome, Italy, 16-19 November, 2015 WIFS 2015

Cyber-physical intrusion detection on a robotic vehicle

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cyber-physical intrusion detection on a robotic vehicle

Tuan Vuong, George Loukas and Diane Gan

University of Greenwich,

London, UK

WIFS 2015 – Tuan Vuong 1

Cyber-physical

intrusion detection on a robotic vehicle

The 7th IEEE International Workshop on

Information Forensics and Security

Rome, Italy, 16-19 November, 2015

WIFS 2015

Page 2: Cyber-physical intrusion detection on a robotic vehicle

WIFS 2015 – Tuan Vuong 2 Source: Internet

Look for:

• Hidden

threat

Page 3: Cyber-physical intrusion detection on a robotic vehicle

WIFS 2015 – Tuan Vuong 3 Source: Internet

Camouflaged

sniper with a

rifle

How

about:

• Motion

detection

•Heat map

Page 4: Cyber-physical intrusion detection on a robotic vehicle

Robotic vehicles

WIFS 2015 – Tuan Vuong 4

Our Cyber-Physical System (CPS) testbed:

Computer-control: Linux laptop

Control physical entities: Wheels, Batteries,

Camera, Accelerometer, …

Network of interacting elements: Wifi,

Ethernet

Source: Wu 2011

CPS samples:

Page 5: Cyber-physical intrusion detection on a robotic vehicle

Security Challenges

WIFS 2015 – Tuan Vuong 5

Hack-a-car1:

02/2014, Wired, $20

Windows, lights,

steering, brakes

Spoofing and jamming a drone3

Kill a jeep in highway2:

07/2015, Wireless

Dashboard, steering,

brakes, transmission

Page 6: Cyber-physical intrusion detection on a robotic vehicle

Aims

WIFS 2015 – Tuan Vuong 6

Robotic Vehicle

Metrics Security

/IDS

Research aims: Light-weight on-board system for robotic vehicle

Cyber attack detection using both cyber and

physical features.

Performance metrics for intrusion detection in CPS. Applying Machine Learning to

Robotic Vehicle’s Intrusion Detection

Defence Mechanisms

Preventive

Reactive

Authentication

Resilience

Self-awareness

By type of defence

Detection

Response

By degree of distribution

Centralised

Distributed

By organisational element

System

Process

Human

Cyber input

Physical input

Cyber-physical input

Network traffic control

Network reconfiguration

Shut-down of services

Page 7: Cyber-physical intrusion detection on a robotic vehicle

Intrusion detection approaches

WIFS 2015 – Tuan Vuong 7

Intrusion Detection goals

1. Common attacks

2. Light-weight

3. On-board

4. Cyber &physical features

Year:

2011-

2013

2008-

2009

2015

2014

2014

2014

2014

2008

Page 8: Cyber-physical intrusion detection on a robotic vehicle

Components

WIFS 2015 – Tuan Vuong 8

Indicators Function Data Sources

Encoders Sensing Robot

Power Sensing PC

Accelerometers Sensing Smart Phone

CPU Data Control Robot

Network Control Robot

Disk Data Control Robot

Page 9: Cyber-physical intrusion detection on a robotic vehicle

Attacking scenarios

WIFS 2015 – Tuan Vuong 9

Attacking

Computers

Conditions

TCP traffic flood

Rogue cmd “STOP” or “LEFT”

Modify NET control setting

Resource-demanding tasks

Camera feed + legitimate cmd

Page 10: Cyber-physical intrusion detection on a robotic vehicle

Features & Labelling

WIFS 2015 – Tuan Vuong 10

Data collection

Features: 8 + 1 labelling (ground

truth)

Each has different sample rate

Collected 52,215 points per

feature

Data during DoS attack scenario

Page 11: Cyber-physical intrusion detection on a robotic vehicle

Framework

WIFS 2015 – Tuan Vuong 11

Prediction study design

80% for training (70% randomly) and testing (30%)

20% for validation

Data preparation:

5 scenarios

Cyber & physical data

from different sources

Feature extraction

Synchronization

Interpolation

Labelling

Page 12: Cyber-physical intrusion detection on a robotic vehicle

Validation

YES

NO

Machine Learning Algorithm

WIFS 2015 – Tuan Vuong 12

Decision Tree C5.0 using R programming

language (widely used for data analysis)

Transformation less important, robust to set

of attributes

Fast, compact when trained

Simple to understand/interpret

Problem: over-fitted

Algorithm consideration:

Performance

Data/features: transformation

Type: Binary classification

Page 13: Cyber-physical intrusion detection on a robotic vehicle

Evaluation: Confusion matrix

WIFS 2015 – Tuan Vuong 13

Confusion matrix

Result:

Page 14: Cyber-physical intrusion detection on a robotic vehicle

Receiver Operating

Characteristic (ROC) Curves

WIFS 2015 – Tuan Vuong 14

ROC curves

Result:

AUC (Area under the curve)

Page 15: Cyber-physical intrusion detection on a robotic vehicle

Detection Latency

WIFS 2015 – Tuan Vuong 15

Real-time for CPS

Various factors:

Data collection time (gathering &

measuring): different frequency per feature

Preparation time: pre-processing (cleaning

scaling, normalizing), interpolation,

Detection accuracy: TP (true positive) vs.

FN (false negative)

Detection result:

DL: Detection Latency

FP : False Positive

FN: False Negative

Page 16: Cyber-physical intrusion detection on a robotic vehicle

Conclusion and future work

Conclusion:

Light-weight on-board intrusion detection for robotic vehicle

Four attacks and detection performance with and without physical features

Performance metrics: Confusion matrix, ROC Curve, and Detection latency

Future work:

Improve current technique (over-fitted, time-series)

More attack types (communication jamming, relay attacks..)

Unknown attack, other detection methods

Additional test beds

WIFS 2015 – Tuan Vuong 16

Page 17: Cyber-physical intrusion detection on a robotic vehicle

Q&A

WIFS 2015 – Tuan Vuong 17

Thank you!