59
Anomaly Based Intrusion Detection System for ZigBee Networks in Smart Grid (ABIDS) Bilal Al Baalbaki, Jesus Pacheco, Youssif Al-Nashif, and Salim Hariri University of Arizona

Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

  • Upload
    others

  • View
    15

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Anomaly Based Intrusion Detection System for

ZigBee Networks in Smart Grid (ABIDS)

Bilal Al Baalbaki, Jesus Pacheco, Youssif Al-Nashif, and Salim Hariri

University of Arizona

Page 2: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Agenda

Motivation

Smart Grid

ZigBee

Anomaly Rule-Based IDS Approach

Tested Attacks

Experimental Results

Conclusion

Current work

Page 3: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Motivation

According to DOE report [2012] the current electric grid lacks of the following

points:

Reliability: During last 40 years, there were 8 massive blackout, which took all

US electricity down. Just in the past nine years, three blackout have occurred.

Efficiency: If we can make the electricity 5% more efficient, then we can

support 6 million new houses and save $600 million.

Economy: In 2000, one hour blackout in Chicago costs the board of trade

around $20 trillion.

Security: The current topology of the electric gird makes it open for any attack.

Since US grid is centralized in most of it parts then any failure will lead to

catastrophic consequences. The current monitoring systems are reactive and behind

the action, and takes long time to recover the system.

Page 4: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Smart Grid

According to [Yan2013]

Intelligent: SG is capable of sensing systems and predicting the coming

electricity peaks. As a result, SG will be able to mitigate any potential

failure or outage. Moreover, it has the capability to switch the power source

between the conventional ones and the renewable energy to provide the

consumers with the highest energy quality with the cheapest price. All the

previously mentioned factors, they should be done with low intervene from

the users.

Efficient: SG is able to meet the increased demand for the electricity since

it uses the energy resources in an optimal way, and always has a backup

plants.

Page 5: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Smart Grid [Yan2013] (cont’d)

Motivating: SG enables two communication ways between the consumers

and their service providers. Consequently, both will have better

understanding of the current status (price, demand, etc.) of the electricity

and will be motivated to take actions that improve the operations of smart

grid and reduce operations costs.

Quality-focused: SG is capable of improving the delivered power. A few

of these qualities: continuity of service, no variation in voltage magnitude,

smooth transient voltages and currents, low harmonic content in the

waveforms, and free of disturbances and interruptions.

Resilient: SG system will be able to adapt smoothly to any change or

failure in the electric grid. Furthermore, SG will be more robust against the

attacks and natural disasters as it becomes more decentralized and

reinforced with Smart Grid security protocols.

Page 6: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Figure 1. General Diagram for Smart Grid

Page 7: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Figure 2. Smart Home Technology Overview

Page 8: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

ZigBee

Low-power wireless M2M networks. The ZigBee standard operates on the IEEE

802.15.4 physical radio specification and operates in unlicensed bands (ISM)

including 2.4 GHz, 900 MHz and 868 MHz

Frequency

(MHZ)

Data rate

(Kbps)

Number of

Cannels

Location

2400 250 16 Global

915 40 10 America

868 20 1 Europe

Table 1. Wireless Network Radio Frequency Bands [Lundgren2012]

Page 9: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Specification

Short-range

Low-power

Low-data-rate

Wireless multi-hop networking technology standard

Go from sleep to active mode in(15-30)ms

Each ZigBee device can handle up to 65k nodes

Page 10: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Topology

Full Function Device (FFD):

� Can be either coordinator or router

� Can talk to any node

� Starts the network and authenticates RFD

� Connects networks with each other

� Can fit in any network topology (star, cluster tree, peer to peer or mesh)

Reduced Function Device (RFD):

� Can be just an end-point

� Can talk only to FFD

� Ask FFD for authentication

Page 11: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Topology (Cont’d)

ZigBee Coordinator (ZC)

ZigBee Router (ZR)

ZigBee Trust Center (ZTC)

ZigBee End Device (ZED)

ZigBee Gateway (ZG)

Page 12: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Architecture

Figure 4. ZigBee Protocol

Stack[Kunz, Lung 2012]

Page 13: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Mesh Network

Figure 5. Mesh Network [ZigBee Alliance 2014]

Page 14: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Security Keys

MASTER KEYS

Most of the time these keys are factory installed. If they are not provided, Trust center consider MAC address as a master key.

NETWORK KEYS

All devices on a ZigBee network share the same key. The FFD that start the network can choose the network key.

LINK KEYS

Keys that originate from the Trust Center are called Trust Center Link

Page 15: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

ZigBee Pro Security

Access control

Key based

Frame Counter

ZIGBEE’S SECURITY MEANS TWO THINGS

ENCRYPTION: MALICIOUS NODES CANNOT DECODE THE

DATA

AUTHENTICATION: ZIGBEE’S NODES DO NOT EXECUTE

ANY COMMAND FROM UNTRUSTED DEVICE

Page 16: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Related Work[Hwajeong 2011]: (public, master and private key)

Approach: setup, encryption, key generation, decryption, and delegation.

Advantages: Reduce the key numbers, which reduced the size of the required

memory

Drawbacks: 1- An intruder with low monitoring overhead and data extraction

skills can gain access to the system.

2- The system does not support digital signature since it depends on the

attributes, and hence cannot be protected from malicious injection.

[Jokar, Leung 2011]: (Specification IDS)

Approach: 7 specifications (4 PHY and 3 MAC) to build a normal behavioral

model.

Advantages: It can detect unknown attacks

Drawbacks: 1- Has high false positive alerts since it uses the nominal values

only.

2- It is just a simulation work

Page 17: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Related Work[Namboodiri 2013]: (Secure HAN)

Approach: Divide HAN into 4 groups, and each group has it own power

history logger to protect Advanced Meter Infrastructure (AMI) data

Advantages: Add time sensitivity to security concerns

Drawbacks: 1- It can only detect known attacks.

2- The user is always trustworthy.

[Manikopolous 2010]: (Statistical IDS)

Approach: Use neural network classifier to differentiate between the normal

and abnormal data. All the data upper or below a predefined threshold will be

tagged as abnormal

Advantages: Has high detection rate when the traffic intensity is high

Drawbacks: The detection rate decreased significantly when the attack

intensity becomes low

Page 18: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

ABIDS Approach

Almost all the related research target

either the integrity or confidentiality

ABIDS has one assumption, which is

any attack, misconfiguration, or misuse

will lead to a behavior that is different

from the normal behavior that we refer

to as an abnormal behavior.

Figure 6. ABIDS Work Steps.

Page 19: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Figure 7. ABIDS Architecture.

Page 20: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

TestBed A

RF

Page 21: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

TestBed B

Ethernet

Page 22: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis
Page 23: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Arduino Xbee Shield

Ubisys TransceiverXbee PRO Transceiver

Page 24: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Monitoring:

�Wireshark&Tshark

�The unit has two outputs:

�1) To dataset in the training phase.

�2) To the rule selection unit in the run-time phase.

Page 25: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Dataset:� PostgreSQL.

� The stored data are categorized into keys, addresses, IDs and

payload.

�All the data are store in integer type, which makes the data

mining results more effective.

� ABIDS dataset contains both the normal data, and the

abnormal data.

Page 26: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Training Unit:

� Feature extraction: In this module the data are filtered

and rearranged, so all the repeated data, unnecessary data,

static data will be dropped. The previous action ensures the

best data analysis and classification.

� Rules Generation:

I. ABIDS uses weka.

II. JRip

Page 27: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Reference Profile

Anomaly Protection Engine

� Rule Selection: This unit will attempt to detect the

occurrence of any abnormal event.

�Classification:

I. Impact

II. Target

III. Connection

�Risk Management

Action Handling

Impact Target Connection

LL 1

ZC/ZED Insider/OutsiderL 2

H 3

HH 4

Table 2. Attacks Classes.

Page 28: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Classification Unit

Figure 8. Classification Unit.

Page 29: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Tested Attacks

1. Wide Band DoS

2. Flooding

3. Delay

4. NWK Knockdown

5. Jamming

6. Pulse DoS

Page 30: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Experimental Results

Attacks Detection Ability Attacks

DoS √ KNOWN

Delay √ KNOWN

Flooding √ KNOWN

NWK

Knockdown

√ UNKNOWN

Jamming √ UNKNOWN

Pulse DoS √ UNKNOWN

Table 2. Detection Ability.

Page 31: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Detection Rate

Figure 9. Detection Rate.

Page 32: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

ABIDS VS Statistical IDs

Figure 10. ABIDS vs Statistical IDS.

Page 33: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Classified Attacks

Target Attacks

1 2 3 4 5 6

ZC 1,O 2,O 4,O

ZED 2,O 3,O 2,I 3,I

Table 3. Combination of attack classes.

1. Wide Band DoS

2. Flooding

3. Delay

4. NWK Knockdown

5. Jamming

6. Pulse DoS

Page 34: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Classification Rate

Figure 11. Classification Rate.

1. Wide Band DoS

2. Flooding

3. Delay

4. NWK Knockdown

5. Jamming

6. Pulse DoS

Page 35: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Conclusion

Smart Grid (SG) is a promising technology for improve performance and

reduce waste in power generation, distribution and consumption.

SG has many potential vulnerabilities that make SG systems attractive

for cyber-attacks especially for residential regions.

ABIDS approach can efficiently detect unknown attacks as well as known

attacks.

The experimental results showed that ABIDS achieved zero false positive

alerts and 2% false negative for unknown attacks.

ABIDS provided a classification module for the detected attacks in order

to provide the best response to stop or mitigate the impact of the detected

attack.

Page 36: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Future Work

Enhancing the attack classification rate

Adding more smart home features to our testbed as face recognition, and

fingerprint reading to evaluate ABIDS system.

Extending ABIDS testbed to include more smart grid regions.

� Big data collector

� Data aggregation and correlation

� Cyber-physical Behavior Analysis

� Risk and impact analysis

� Response unit

Page 37: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

References

“The SMART GRID: An Introduction,” prepared for the U.S. Department

of Energy by Litos Strategic Communication under contract No. DE-

AC26-04NT41817, Subtask 560.01.04, released in 2012

Y. Yan, Y. Qian, H. Sharif, D. Tipper, “A Survey on Cyber Security for

Smart Grid Communications,” Communications Surveys & Tutorials, IEEE

, vol.14, no.4, pp.998,1010, Fourth Quarter 2012.

ZigBee Alliance, Online Available: http://www.zigbee.org/

Biswas, A. Alkhalid, T. Kunz, C. H. Lung, “A Lightweight Defense

against the Packet in Packet Attack in ZigBee Networks,” Wireless Days

(WD), 2012 IFIP , vol., no., pp.1,3, 21-23 Nov. 2012.

M. H. Bhuyan; D. K. Bhattacharyya; J. K. Kalita, “Network Anomaly

Detection: Methods, Systems and Tools,” Communications Surveys &

Tutorials, IEEE, vol.16, no.1, pp.303, 336, First Quarter 2014.

Page 38: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

ReferencesM. Yu, “A Nonparametric Adaptive Cusum Method And Its Application

In Network Anomaly Detection,” International Journal of Advancements

in Computing Technology, vol. 4, no. 1, pp. 280–288, 2012.

C. Manikopoulos, S. Papavassiliou, “Network Intrusion and Fault

Detection: A Statistical Anomaly Approach,” IEEE Communications

Magazine, vol. 40, no. 10, pp. 76–82, October 2010.

P. Jokar; H. Nicanfar; V. C M Leung, "Specification-based Intrusion

Detection for home area networks in smart grids," Smart Grid

Communications (SmartGridComm), 2011 IEEE International Conference

on , vol., no., pp.208,213, 17-20 Oct. 2011

S. Hwajeong; K. CheolSoo; K. Howon, "ZigBee security for Home

automation using attribute-based cryptography," Consumer Electronics

(ICCE), 2011 IEEE International Conference on, vol., no., pp.367, 368,

9-12 Jan. 2011

Page 39: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

(up to now)

Page 40: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Thank you

Page 41: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Motivation (cont’d)

Environment/Climate Change: US population is 4% of the whole world

population while it contributes more than 25% in the greenhouse gases [72]. The

previous problem is resulted because more than 50% of US electricity is produced

from burning coal.

Affordability: To address all the previous problems, electric grid should build

more power plants, add more substations, update the transmission lines and the

transformers, etc. All that will be reflected on the electricity bill without mentioning

that the KWH price has been tripled since 2006.

Page 42: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Smart Grid (SG)

Real-time display of data to consumer and

utility.

Control from utility company (demand-

response).

Intelligent appliances.

Exporting generated power from renewable

resources.

Page 43: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

IEEE 802.15.4

DSSS for moving between channels

High performance with low SNR

CSMA-CA

O-QPSK and BPSK

Half-duplex operation

Page 44: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

IEEE 802.15.4 PHY

Activating and deactivating the transceiver

Transmitting and receiving data

Does Energy Detection (ED)

Perform Carrier Sense (CS)

Determine The Link Quality Indicator (LQI)

Perform Channel Clear Assessment (CCA)

Page 45: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

IEEE 802.15.4 MAC

Device Association and Disassociation

GTS Management

Orphan Notification

Channel Scanning

Page 46: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

ZigBee NWK

Broadcasting

Multicasting

Tree Topology

Mesh Topology

Routing

a b c

Page 47: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

MAC

Secure one-hop link between devices.

Control accessing the wireless

communications medium.

Manage network association and dissociation

functions though using 64-bit MAC addresses.

Provide security services including integrity,

and access control.

Page 48: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis
Page 49: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Cskip (d) = {1+Cm×(Lm−d−1) , if Rm=1

{1+Cm−Rm−Cm×RmLm−d−1/(1−Rm),otherwise [54]

The nth end device address=Parent address+Cskip(d)×Rm+n [54]

A < D < Cskip (d-1) [54]

Address of the next hop=A+1+int((D−(A+1))/Cskip(d))×Cskip(d) [54]

Page 50: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

NTW

Start Networks

Responsible for Addressing

Neighbor discovery

Routing Discovery

Page 51: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

APS

Filters out packets for non-registered

endpoints, or profiles that don't match

Generates acknowledgments (Optional)

Maintains the local binding table

Fragments and reassembles the

packets

Page 52: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

ZigBee Pro

Mesh only

Same Logical Device Types as ZigBee feature set (ZC, ZR,

ZED)

Network Manager for PAN ID conflict resolution and

frequency agility

Symmetric Key with AES-128-CCM*

Key Hierarchy: Master Keys (optional), Network Keys and

Link Keys (optional)

Page 53: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis
Page 54: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis
Page 55: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis
Page 56: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis
Page 57: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Applications

Figure 3. ZigBee Applications [ZigBee Alliance 2014]

Page 58: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Tools&Devices

Wireshark &Tshark

X-CTU

Postgres SQL

Weka

Digi platform

ZigBee Transcievers (e.g. ubisys, Memsic, and Xbee)

Libpcap

Page 59: Anomaly Based Intrusion Detection System for ... · Anomaly Rule-Based IDS Approach Tested Attacks Experimental Results Conclusion Current work. ... Cyber-physical Behavior Analysis

Figure 12. MTDApproach