2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S) 2020
DOI: 10.1109/dsn-s50200.2020.00014
|View full text |Cite
|
Sign up to set email alerts
|

Towards Host Intrusion Detection for Embedded Industrial Systems

Abstract: Original Equipment Manufacturers now embed hardware virtualization in car equipments to reduce costs and hardware complexity, while allowing more functionalities, such as connectivity. This evolution forces the cohabitation of distinct criticality domains on the same hardware, reaffirming the need for security. Because of the trade-off between performance and system overall complexity, deploying security becomes a challenging balancing act. Host Intrusion Detection Systems (HIDS) security protects the behavior… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…We have developed a table-driven VM scheduler for Xen, a new clock mode and tracing hooks to handle safety-critical applications that have real-time requirements and have to synchronize their activities across FNs [17]. PikeOS has been extended with container capabilities and with continuous monitoring services for security [18].…”
Section: B Fog Node Hypervisors and Middlewarementioning
confidence: 99%
See 1 more Smart Citation
“…We have developed a table-driven VM scheduler for Xen, a new clock mode and tracing hooks to handle safety-critical applications that have real-time requirements and have to synchronize their activities across FNs [17]. PikeOS has been extended with container capabilities and with continuous monitoring services for security [18].…”
Section: B Fog Node Hypervisors and Middlewarementioning
confidence: 99%
“…The FCP implements the Precise Time Protocol Multi-Domain Aggregation for safe and secure clock synchronizations [30]. The security services are implemented as the lightweight authentication protocols for secure and efficient TLS Session Resumption, rTLS [31] and a host intrusion detection system integrated to the FCP [18]. The dependability services are based on a framework for recovery using fault-tolerant mechanism [32] and fault tolerant scheduling solutions for multi-criticality TSN traffic [33].…”
Section: E Services and Applicationsmentioning
confidence: 99%
“…Host IDS detect attacks based on system logs, audit data, Windows Registry, file systems, system calls, and program analysis [17]. Two of the most important areas of interest in host IDS are embedded systems [18] and the Android operating system [19], [20].…”
Section: Related Workmentioning
confidence: 99%
“…It is applicable to HIDS based on system calls or kernel operations [33], [34], [35]. The calls are provided as events, and each process will generate a distinct case.…”
mentioning
confidence: 99%