Skip to main content

Real-Time Self-defense Approach Based on Customized Netlink Connection for Industrial Linux-Based Devices

  • Conference paper
  • First Online:
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2020)

Abstract

With the deep integration of IT (Information Technology) and OT (Operational Technology), various Linux operating systems have been successfully applied in critical industrial devices, such as Linux-based IIoT (Industrial Internet of Things) controllers or gateways, and the vulnerabilities of these systems may become a new breakthrough for the organized and high-intensity attacks. In order to prevent malwares from corrupting or disabling industrial Linux-based devices, this paper proposes a novel real-time self-defense approach, which can be easily developed without redesigning the basic software and hardware platform. By establishing the customized Netlink connection between kernel mode and user mode, this approach can monitor all application processes, and block each new malicious application process, which cannot conform to the trusted white-listing rules. All experimental results show that the proposed approach has a comparative advantage to effectively detect and prevent the malware-related attacks, and provides a self-defense function for industrial Linux-based devices, which meets their availability due to the millisecond resolution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cheminod, M., Durante, L., Valenzano, A.: Review of security issues in industrial networks. IEEE Trans. Ind. Inform. 9(1), 277–293 (2013)

    Article  Google Scholar 

  2. Lyu, X., Ding, Y., Yang, S.: Safety and security risk assessment in cyber-physical systems. IET Cyber-Phys. Syst.: Theory Appl. 4(3), 221–232 (2019)

    Article  Google Scholar 

  3. Wu, G., Sun, J.: Optimal switching integrity attacks on sensors in industrial control systems. J. Syst. Sci. Complex. 32(1), 1290–1305 (2019)

    Article  MathSciNet  Google Scholar 

  4. Adepu, S., Kandasamy, N.K., Zhou, J., Mathur, A.: Attacks on smart grid: power supply interruption and malicious power generation. Int. J. Inf. Secur. 19(2), 189–211 (2019). https://doi.org/10.1007/s10207-019-00452-z

    Article  Google Scholar 

  5. Yuan, H., Xia, Y., Zhang, J., Yang, H., Mahmoud, M.: Stackelberg-game-based defense analysis against advanced persistent threats on cloud control system. IEEE Trans. Ind. Inform. 6(3), 1571–1580 (2020)

    Article  Google Scholar 

  6. Pogliani, M., Quarta, D., Polino, M., Vittone, M., Maggi, F., Zanero, S.: Security of controlled manufacturing systems in the connected factory: the case of industrial robots. J. Comput. Virol. Hacking Tech. 15(3), 161–175 (2019). https://doi.org/10.1007/s11416-019-00329-8

    Article  Google Scholar 

  7. Wan, M., Shang, W., Zeng, P.: Double behavior characteristics for one-class classification anomaly detection in networked control systems. IEEE Trans. Inf. Forensics Secur. 12(12), 3011–3023 (2017)

    Article  Google Scholar 

  8. Nguyen-Hoang, P., Vo-Tan, P.: Development an open-source industrial IoT gateway. In: 2019 19th International Symposium on Communications and Information Technologies (ISCIT), pp. 201–204. IEEE, Ho Chi Minh City (2019)

    Google Scholar 

  9. Erwinski, K., Paprocki, M., Grzesiak, M., Karwowski, K., Wawrzak, A.: Application of ethernet powerlink for communication in a Linux RTAI open CNC system. IEEE Trans. Ind. Electron. 60(2), 628–636 (2013)

    Article  Google Scholar 

  10. Tufail, H., Anwar, M., Qasim, I., Azam, F.: Towards the selection of optimum alarms system in leading industry automation software. In: 2019 8th International Conference on Industrial Technology and Management (ICITM), pp. 241–246. IEEE, Cambridge (2019)

    Google Scholar 

  11. Su, J., Vasconcellos, D., Prasad, S., Sgandurra, D., Feng, Y., Sakurai, K.: Lightweight classification of IoT malware based on image recognition. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), pp. 664–669. IEEE, Tokyo (2018)

    Google Scholar 

  12. Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other Botnets. Computer 50(7), 80–84 (2017)

    Article  Google Scholar 

  13. Zhang, N., et al.: Physical layer authentication for internet of things via WFRFT-based Gaussian gag embedding. IEEE Internet Things J. 7, 9001–9010 (2020)

    Article  Google Scholar 

  14. Zhang, N., Wu, R., Yuan, S., Yuan, C., Chen, D.: RAV: relay aided vectorized secure transmission in physical layer security for internet of things under active attacks. IEEE Internet Things J. 6(5), 8496–8506 (2019)

    Article  Google Scholar 

  15. Lee, S., Lee, S., Yoo, H., Kwon, S., Shon, T.: Design and implementation of cybersecurity testbed for industrial IoT systems. J. Supercomput. 74(9), 4506–4520 (2017). https://doi.org/10.1007/s11227-017-2219-z

    Article  Google Scholar 

  16. Yuan, J., Li, X.: A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion. IEEE Access 6, 23626–23638 (2018)

    Article  Google Scholar 

  17. Maene, P., Götzfried, J., Clercq, R., Müller, T., Freiling, F., Verbauwhede, I.: Hardware-based trusted computing architectures for isolation and attestation. IEEE Trans. Comput. 67(3), 361–374 (2018)

    Article  MathSciNet  Google Scholar 

  18. Ashraf, N., Masood, A., Abbas, H., Latif, R., Shafqat, N.: Analytical study of hardware-rooted security standards and their implementation techniques in mobile. Telecommun. Syst. 74(3), 379–403 (2020). https://doi.org/10.1007/s11235-020-00656-y

    Article  Google Scholar 

  19. Jia, J., Liu, G., Han, D., Wang, J.: A novel packets transmission scheme based on software defined open wireless platform. IEEE Access 6, 17093–17118 (2018)

    Article  Google Scholar 

  20. Zarrabi, A., Samsudin, K., Adnan, W.A.W.: Linux support for fast transparent general purpose checkpoint/restart of multithreaded processes in loadable kernel module. J. Grid Comput. 11, 187–210 (2013)

    Article  Google Scholar 

  21. Alves, T., Buratto, M., Souza, F., Rodrigues, T.: OpenPLC: an open source alternative to automation. In: IEEE Global Humanitarian Technology Conference (GHTC), pp. 585–589. IEEE, San Jose (2014)

    Google Scholar 

  22. Wan, M., Shang, W., Kong, L., Zeng, P.: Content-based deep communication control for networked control system. Telecommun. Syst. 65(1), 155–168 (2016). https://doi.org/10.1007/s11235-016-0223-x

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the Program of Hainan Association for Science and Technology Plans to Youth R & D Innovation (Grant No. QCXM201910), the Natural Science Foundation of Liaoning Province (Grant No. 2019-MS-149), the National Natural Science Foundation of China (Grant No. 61802092), and the Scientific Research Setup Fund of Hainan University (Grant No. KYQD (ZR) 1837).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiangyuan Yao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wan, M., Li, J., Yao, J. (2021). Real-Time Self-defense Approach Based on Customized Netlink Connection for Industrial Linux-Based Devices. In: Gao, H., Wang, X., Iqbal, M., Yin, Y., Yin, J., Gu, N. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 349. Springer, Cham. https://doi.org/10.1007/978-3-030-67537-0_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-67537-0_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-67536-3

  • Online ISBN: 978-3-030-67537-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics