DEVELOPMENT OF MANAGEMENT COMPONENT IN PROCESSING SUBSYSTEM FOR INTRUSION DETECTION SYSTEM AT CYBER-PHYSICAL SYSTEM
Cyber-Physical Systems (CPS) combine cyber computing with the physical world. CPS is widely used in critical large-scale applications, such as water flow control in dams and industrial control systems in various companies. Due to their safety- critical nature, attacks on CPS can have massive im...
Saved in:
Main Author: | |
---|---|
Format: | Final Project |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/74167 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Summary: | Cyber-Physical Systems (CPS) combine cyber computing with the physical world.
CPS is widely used in critical large-scale applications, such as water flow control
in dams and industrial control systems in various companies. Due to their safety-
critical nature, attacks on CPS can have massive impacts. For example, the cyber-
attack on the power grid in Ukraine resulted in 225,000 people experiencing a
power outage. Building an Intrusion Detection System (IDS) for CPS is one
solution to protect CPS from attacks.
An effective approach to building an IDS is anomaly-based detection with the
assistance of machine learning. This approach identifies attacks based on
anomalous events using machine learning techniques. However, one challenge in
this approach is the handling of new attack cases since a learning model tends to be
specific to a particular type of attack. To address this, a management component is
built within the IDS to facilitate model switching, new model construction, and
other configuration changes, enabling the IDS to adaptively handle various attacks.
The management component adopts an A/B testing approach to switch detection
models, ensuring continuous protection of CPS by the IDS. To build new models,
a separate service called the training service is established with ongoing control
from the management component. The implementation of the management
component has successfully realized an IDS that is adaptive to attacks. However,
there are shortcomings that need to be addressed in future development, specifically
the need for a more robust system architecture to avoid tightly coupling certain
components. |
---|