关键词:
Multi-objective Bat algorithm
Intrusion protection system
Real time operating systems (ROTS)
The quality of service (QoS)
Industrial control systems (ICS)
Optimization
摘要:
The rise of digitization in Industrial Control Systems (ICSs) using Commercial Off-The-Shelf software has stimulated the use of existing IT security solutions. This trend involves serious risks, due to the unsuitability of most existing IT security solutions to ICSs environments. The aim of this study is to prevent Intrusion Detection and Prevention Systems' (IDPSs) behaviors from degrading the QoS of data transfers between time sensitive subsystems of ICSs. Facilities such as Nuclear Power Plants (NPPs) often have systems using Real Time Operating Systems (RTOS), which have to be response-time deterministic. A module is designed based on the utilization law, queuing theory, and a heuristic algorithm in order to evaluate and propose the optimal security policy and configuration for each role representing a machine. The crux of this approach is that the module integrated with the IDPS, solve an optimization problem using the Bat algorithm to generate a Pareto set of optimal solutions and propose the best one that will guarantee the security required for a role, while maintaining QoS (i.e. response time inferior to the Worst Case Execution Time (WCET)). MATLAB is used to simulate the proposed method. The results show that the IDPS efficiently selects the best security policies for all active roles and minimize the chances of WCET violations, thus, avoid any undesirable effects. As shown in the simulation scenarios, the module was able to propose a policy which represents an optimal solution where the security strength value is 0.68942 and the response time is 0.219015 s. Moreover, in the second scenario, even though the first run did not find any optimal solution, the improvement introduced using the urgency flag, solve the problem and propose a security policy for the role under evaluation. Therefore, the approach guarantees the maximum security possible without violating the WCET of roles. The study sheds light on the deficiencies and weaknesses of security systems