Abstract
With the deep integration of IT (Information Technology) and OT (Operational Technology), various Linux operating systems have been successfully applied in critical industrial devices, such as Linux-based IIoT (Industrial Internet of Things) controllers or gateways, and the vulnerabilities of these systems may become a new breakthrough for the organized and high-intensity attacks. In order to prevent malwares from corrupting or disabling industrial Linux-based devices, this paper proposes a novel real-time self-defense approach, which can be easily developed without redesigning the basic software and hardware platform. By establishing the customized Netlink connection between kernel mode and user mode, this approach can monitor all application processes, and block each new malicious application process, which cannot conform to the trusted white-listing rules. All experimental results show that the proposed approach has a comparative advantage to effectively detect and prevent the malware-related attacks, and provides a self-defense function for industrial Linux-based devices, which meets their availability due to the millisecond resolution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cheminod, M., Durante, L., Valenzano, A.: Review of security issues in industrial networks. IEEE Trans. Ind. Inform. 9(1), 277–293 (2013)
Lyu, X., Ding, Y., Yang, S.: Safety and security risk assessment in cyber-physical systems. IET Cyber-Phys. Syst.: Theory Appl. 4(3), 221–232 (2019)
Wu, G., Sun, J.: Optimal switching integrity attacks on sensors in industrial control systems. J. Syst. Sci. Complex. 32(1), 1290–1305 (2019)
Adepu, S., Kandasamy, N.K., Zhou, J., Mathur, A.: Attacks on smart grid: power supply interruption and malicious power generation. Int. J. Inf. Secur. 19(2), 189–211 (2019). https://doi.org/10.1007/s10207-019-00452-z
Yuan, H., Xia, Y., Zhang, J., Yang, H., Mahmoud, M.: Stackelberg-game-based defense analysis against advanced persistent threats on cloud control system. IEEE Trans. Ind. Inform. 6(3), 1571–1580 (2020)
Pogliani, M., Quarta, D., Polino, M., Vittone, M., Maggi, F., Zanero, S.: Security of controlled manufacturing systems in the connected factory: the case of industrial robots. J. Comput. Virol. Hacking Tech. 15(3), 161–175 (2019). https://doi.org/10.1007/s11416-019-00329-8
Wan, M., Shang, W., Zeng, P.: Double behavior characteristics for one-class classification anomaly detection in networked control systems. IEEE Trans. Inf. Forensics Secur. 12(12), 3011–3023 (2017)
Nguyen-Hoang, P., Vo-Tan, P.: Development an open-source industrial IoT gateway. In: 2019 19th International Symposium on Communications and Information Technologies (ISCIT), pp. 201–204. IEEE, Ho Chi Minh City (2019)
Erwinski, K., Paprocki, M., Grzesiak, M., Karwowski, K., Wawrzak, A.: Application of ethernet powerlink for communication in a Linux RTAI open CNC system. IEEE Trans. Ind. Electron. 60(2), 628–636 (2013)
Tufail, H., Anwar, M., Qasim, I., Azam, F.: Towards the selection of optimum alarms system in leading industry automation software. In: 2019 8th International Conference on Industrial Technology and Management (ICITM), pp. 241–246. IEEE, Cambridge (2019)
Su, J., Vasconcellos, D., Prasad, S., Sgandurra, D., Feng, Y., Sakurai, K.: Lightweight classification of IoT malware based on image recognition. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), pp. 664–669. IEEE, Tokyo (2018)
Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other Botnets. Computer 50(7), 80–84 (2017)
Zhang, N., et al.: Physical layer authentication for internet of things via WFRFT-based Gaussian gag embedding. IEEE Internet Things J. 7, 9001–9010 (2020)
Zhang, N., Wu, R., Yuan, S., Yuan, C., Chen, D.: RAV: relay aided vectorized secure transmission in physical layer security for internet of things under active attacks. IEEE Internet Things J. 6(5), 8496–8506 (2019)
Lee, S., Lee, S., Yoo, H., Kwon, S., Shon, T.: Design and implementation of cybersecurity testbed for industrial IoT systems. J. Supercomput. 74(9), 4506–4520 (2017). https://doi.org/10.1007/s11227-017-2219-z
Yuan, J., Li, X.: A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion. IEEE Access 6, 23626–23638 (2018)
Maene, P., Götzfried, J., Clercq, R., Müller, T., Freiling, F., Verbauwhede, I.: Hardware-based trusted computing architectures for isolation and attestation. IEEE Trans. Comput. 67(3), 361–374 (2018)
Ashraf, N., Masood, A., Abbas, H., Latif, R., Shafqat, N.: Analytical study of hardware-rooted security standards and their implementation techniques in mobile. Telecommun. Syst. 74(3), 379–403 (2020). https://doi.org/10.1007/s11235-020-00656-y
Jia, J., Liu, G., Han, D., Wang, J.: A novel packets transmission scheme based on software defined open wireless platform. IEEE Access 6, 17093–17118 (2018)
Zarrabi, A., Samsudin, K., Adnan, W.A.W.: Linux support for fast transparent general purpose checkpoint/restart of multithreaded processes in loadable kernel module. J. Grid Comput. 11, 187–210 (2013)
Alves, T., Buratto, M., Souza, F., Rodrigues, T.: OpenPLC: an open source alternative to automation. In: IEEE Global Humanitarian Technology Conference (GHTC), pp. 585–589. IEEE, San Jose (2014)
Wan, M., Shang, W., Kong, L., Zeng, P.: Content-based deep communication control for networked control system. Telecommun. Syst. 65(1), 155–168 (2016). https://doi.org/10.1007/s11235-016-0223-x
Acknowledgements
This work is supported by the Program of Hainan Association for Science and Technology Plans to Youth R & D Innovation (Grant No. QCXM201910), the Natural Science Foundation of Liaoning Province (Grant No. 2019-MS-149), the National Natural Science Foundation of China (Grant No. 61802092), and the Scientific Research Setup Fund of Hainan University (Grant No. KYQD (ZR) 1837).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Wan, M., Li, J., Yao, J. (2021). Real-Time Self-defense Approach Based on Customized Netlink Connection for Industrial Linux-Based Devices. In: Gao, H., Wang, X., Iqbal, M., Yin, Y., Yin, J., Gu, N. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 349. Springer, Cham. https://doi.org/10.1007/978-3-030-67537-0_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-67537-0_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-67536-3
Online ISBN: 978-3-030-67537-0
eBook Packages: Computer ScienceComputer Science (R0)