Denial of Service Attacks On Network-Based Control Systems Impact and Mitigation
Denial of Service Attacks On Network-Based Control Systems Impact and Mitigation
2, MAY 2005 85
Fig. 4. DoS attack Model II (nonlocal network attack). Adjust (mean service time) to approximate the severity of attacks: (a) backward delay and (b) forward
delay. The effect of DoS attack is lumped into .
On the other hand, the DoS attacks may cause the operation of
routers to be unstable or oscillatory, which results in the irreg-
ular pattern of packet flows. The feature of these attacks is that
NBCS packet flow may experience a relatively long delay jitter.
Our modeling approach is to lump the effect of attacks into
the mean service time to reflect the abnormal behavior of the at-
tacked routers. The model is depicted in Fig. 4. The mathematic
expression for Model II is written as
(11)
(12)
where represents the queue model that can be simulated. To
approximate the DoS attacks, we change the mean service time
. A reference value is given first to represent network reg-
ular status. The lumped effect of DoS attacks to the routers in the
path is assumed to cause a larger mean service time . Hence,
we increase to model the elevated severity of the attacks. Con- Fig. 5. Packet rate of model I DoS attacks. Maximum rate ack mag =
trary to DoS attack Model I ( and the attack traffic rate are 1000 packets=s.
used), DoS attack Model II does not contain the explicit attack
flow in the queue. The effect of the DoS attacks is embedded reference input for the control loop is a unit step excitation.
into the adjustable parameter of queue mean service time. In the remainder of the text, the performance values, such as
percentage overshoot, rise and settling time, and mean-squared
IV. SIMULATION METHODOLOGY error, are average values of many simulation runs unless the au-
The stochastic processes in (9)–(12) can have general proba- thors make an explicit statement.
bility distributions. The queue service time in the model can be
interpreted as the time for routers to process the traffic, which
V. PERFORMANCE UNDER DOS ATTACK MODEL I
depends on the size of a packet as well as other relevant fac-
(LOCAL NETWORK ATTACK)
tors. We assume that the service time observes an exponential
distribution with mean (under network regular status/DoS Mean service time and background traffic load
attack Model I) or (under DoS attack Model II). It is a reason- are given as an example of network regular status for
able practice to assume that the background traffic is a Poisson both event- and time-driven controllers. Since the simulation
process with mean rate [17]. The background traffic load can time is 15 s and the sampling rate is 50 samples/s, there are 750
be defined as . The load ratio is understood as the ratio measurements packets from a sensor to a controller. In one sim-
of background traffic to network capacity, and ranges from 0 to ulation run of the network regular case, we average over all
1 according to the assumption that background traffic does not to get the value 6.97 ms of . As reported in [16], the one-way
exceed the capacity. jitter of a major US link from Atlanta to Chicago is 8 ms, which
We assume that the computational time of the controller is supports the use of in the model as an approximation
negligible. Hence, only the stochastic delay jitter and are for the delay jitter under network regular status.
put into the control loop simulation. Packet loss is admissible, In Model I DoS attacks, the injected packet rate grows expo-
and we allow that delay jitter is greater than the sampling period. nentially in the beginning and then saturates at a high level [4].
Each simulation run observes the control system over the be- To fit the time-scale of the simulation, we assume that the arrival
ginning 15 s. The buffer size of queue is ten in all cases. The rate of attack packets grows exponentially to a maximum point
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on November 06,2024 at 11:16:52 UTC from IEEE Xplore. Restrictions apply.
LONG et al.: DENIAL OF SERVICE ATTACKS ON NBCS: IMPACT AND MITIGATION 89
Fig. 6. Performance under model I DoS attacks (local network attack). (a) Event-driven controller. (b) Time-driven controller.
(a)
Fig. 7. Performance under model II DoS attacks (nonlocal network attack). (a) Event-driven controller.
of a NBCS system. Notice that the numerical values of perfor- time than event-driven approach, because more control packets
mance degradation can become extremely large, but it simply arrived at the actuator (at every sampling instant the controller
means that the control system becomes destabilized in the phys- sends the control signal to the actuator). In terms of per-
ical world. Fig. 7(a) also depicts the nonmonotonic behavior of centage overshoot, settling time, and mean-squared error, the
percentage overshoot under the high background traffic load, time-driven approach is more sensitive to the DoS attacks than
which is due to the very large service time that the event-driven method, comparing Fig. 7(b) with Fig. 7(a).
causes excessive packet loss. The reason is that DoS attacks cause the delay jitter much
The performance of rise time (within 0.16–0.26 s) is not longer, and the simple control algorithm of the time-driven
affected significantly by the attacks, compared to the controller approach makes the “bad” compensation.
design specification in Section II. The patterns of settling time
and mean-squared error are very similar to that of percentage
overshoot, which are substantially impaired by DoS attacks. VII. TIME-FREQUENCY ANALYSIS OF DELAY
When DoS attacks get more intense (larger ), the control JITTER AND PACKET LOSS
system becomes unstable. In this section, we apply autocorrelation and power spectrum
density analysis to connect the pattern of the delay jitter/packet
B. Time-Driven PI Controller loss with the performance degradation. The event-driven con-
Fig. 7(b) displays the performance under the time-driven troller is assumed throughout this section.
method. The patterns of Fig. 7(b) are similar to those of We treat the delay jitter vector as time series . The x-axis
Fig. 7(a). Time-driven method is likely to have a shorter rise represents the index of packets while the y-axis denotes the
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on November 06,2024 at 11:16:52 UTC from IEEE Xplore. Restrictions apply.
LONG et al.: DENIAL OF SERVICE ATTACKS ON NBCS: IMPACT AND MITIGATION 91
(b)
Fig. 7. (Continued.) Performance under model II DoS attacks (nonlocal network attack). (b) Time-driven controller. Fewer points in some curves ( > 9 ms)
because of the extremely large percentage overshoot. is the ratio of background traffic to network capacity. The effect of DoS attack is lumped into .
delay jitter or . If there is packet loss during transmis- where denotes the time lag and represents the total number
sion, the delay for lost packet is infinity. Our implementation of packets. is plotted in Fig. 8 (one simulation run for
of simulation program adheres to this rule. To cope with the in- each case). The lag is normalized to range from 0 to 1. The
finity in mathematical analysis, we let if packet is delay jitter and packet loss in time domain are also depicted.
lost. The rationale is that both infinity and zero are special cases Fig. 8(a) shows the reference case ( , ), which
because a packet has to experience finite nonzero jitter in a real is stable with degradation. Fig. 8(b) shows the case ( ,
system. Zero jitter for lost packet is tractable to mathematical , ) under Model I DoS
analysis. Hence, describes actually both delay jitter and attacks, which is stable with degradation. Fig. 8(c) and (d) show
packet loss. the cases ( , ) and ( , )
The discrete version of autocorrelation estimate is under Model II DoS attacks, which are unstable. The statistic
characteristics of delay jitter and packet loss from the simulation
run are listed in Table I.
(14) The two unstable cases exhibit a strong autocorrelation
of the delay jitter while other stable cases display a weak
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on November 06,2024 at 11:16:52 UTC from IEEE Xplore. Restrictions apply.
92 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 1, NO. 2, MAY 2005
Fig. 8. Backward delay jitter and autocorrelation estimates. (a)–(b) Stable control system. (c)–(d) Divergent control system.
autocorrelation. The autocorrelation of the two unstable cases power spectrum density that is defined as the square of the co-
display some big bumps in the plot when the lag is greater efficients of Fourier transform over
than 0.1. It is apparent that the strong autocorrelation of delay
jitter and packet loss of NBCS packets may severely degrade
the control system performance.
To further study the pattern of the delay jitter and packet loss, (15)
we perform frequency analysis on using the technique of
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on November 06,2024 at 11:16:52 UTC from IEEE Xplore. Restrictions apply.
LONG et al.: DENIAL OF SERVICE ATTACKS ON NBCS: IMPACT AND MITIGATION 93
TABLE I
STATISTIC CHARACTERISTICS OF BACKWARD DELAY JITTER (EXCLUDING PACKET LOSS)
Fig. 9. Power spectrum density of backward delay jitter. (a)–(b) Stable control system. (c)–(d) Divergent control system.
where denote the power (or periodicity) at a specific solution to DoS attacks thus far, the common approach of
frequency. The results are depicted in Fig. 9, where there exists mitigation is for routers to identify and then block the attack
a sharp difference between the stable and unstable cases. If we traffic. We refer readers to [18] and [19] for the details in defense
fit a straight line over the lower frequencies by least squares, techniques. For the control loop simulation, the event-driven
then we notice that in the two unstable cases caused by Model controller is assumed throughout this section.
II DoS attacks the straight line has a noticeable negative slope,
whereas the slope is very small in the two stable cases. A. Countermeasure to Model I DoS Attacks (Local Network
Attack)
Since Model I DoS attacks are launched locally, the routers
VIII. MITIGATING MEASURES
within the victim corporate network may detect and stop the
This section discusses the network defense against DoS attack traffic. It is feasible for customer-edge routers to in-
attacks for the security of NBCS. Although there is no complete stall an intrusion detection system that observes the passing
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on November 06,2024 at 11:16:52 UTC from IEEE Xplore. Restrictions apply.
94 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 1, NO. 2, MAY 2005
7: end
8: if num < th AND elapse time > T th
9: reset prob a =
10: reset elapse time =0
11: end
TABLE III
12: Goto Step 1 MITIGATION AGAINST MODEL II DoS ATTACK WITH = 15 ms
AND = 0:1 (EVENT-DRIVEN CONTROLLER)
Fig. 11. Backward delay jitter time series. (a) DoS attack model I, ack mag = 2500 packets=s, = 3 ms, = 0:6. (b) Mitigation for DoS attack model I,
t = 1 s. (c) DoS attack model II, = 15 ms, = 0:1. (d) Mitigation for DoS attack model II, t = 2 s.
In addition, we find that the network defense measures can [20] A. Snoeren, C. Partridge, L. Sanchez, C. Jones, F. Tchakountio, B.
ameliorate the performance degradation. The proposed models Schwartz, S. Kent, and W. Strayer, “Single-packet IP traceback,”
IEEE/ACM Trans. Networking, vol. 10, no. 6, pp. 721–734, Dec. 2002.
of DoS attacks on NBCS can be a useful tool for performance [21] J. Nilsson, B. Bernhardsson, and B. Wittenmark, “Stochastic analysis
evaluation, as we further combine the network mitigation with and control of real-time systems with random time delays,” Automatica,
the more sophisticated control algorithms designed for handling vol. 34, no. 1, pp. 57–64, 1998.
delay jitter such as gain scheduling [7] and optimal stochastic
control [21] in the future research.
Men Long was born in Chongqing, China, in
1978. He received the B.E. degree (Hons.) from
ACKNOWLEDGMENT Chongqing University, Chongqing, in 2000 and the
M.S. degree from The University of Tulsa, Tulsa,
The authors thank the anonymous reviewers for their valuable OK, in 2002, both in electrical engineering. He is
comments and suggestions that greatly helped the research work currently pursuing the Ph.D. degree in the Electrical
and Computer Engineering Department, Auburn
and improved the paper presentation. University, Auburn, AL.
His research interests include mobile computing
and network security.
REFERENCES
[1] M.-Y. Chow and Y. Tipsuwan, “Network-based control systems: a tuto-
rial,” in Proc. 27th Conf. IEEE Industrial Electronics Soc., Denver, CO,
Nov. 2001, pp. 1593–1602. Chwan-Hwa “John” Wu (M’88–SM’94) received
[2] A. Householder, A. Manion, L. Pesante, G. Weaver, and R. Thomas, the B.S. degree from National Chiao-Tung Univer-
“Managing the Threat of Denial-of-Service Attacks,” Carnegie Mellon sity, Hsinchu, Taiwan, R.O.C., in 1980 and the Ph.D.
CERT Coordination Center, Pittsburgh, PA, [Online] Available: degree from the Polytechnic University, New York,
http://www.cert.org/archive/pdf/Managing_DoS.pdf, Oct. 2001. in 1987.
[3] K. Houle, G. Weaver, N. Long, and R. Thomas, “Trends He joined the faculty of Auburn University,
in Denial of Service Attack Technology,” Carnegie Mellon Auburn, AL, in 1987, where he is currently a
CERT Coordination Center, Pittsburgh, PA, [Online] Available: Professor of Electrical and Computer Engineering.
http://www.cert.org/archive/pdf/DoS_trends.pdf, Oct. 2001. He has been the Principal Investigator on research
[4] D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. projects funded by the NSF, NASA, U.S. Marshals
Weaver, “Inside the Slammer worm,” IEEE Security & Privacy Mag., Service, USDA, and Cray Research, Inc. He holds
vol. 1, no. 4, pp. 33–39, 2003. one U.S. patent and is author of Emerging Technologies in Multimedia
[5] S. Staniford, V. Paxson, and N. Weaver, “How to own the Internet in your Computer Communications (Englewood Cliffs, NJ: Prentice-Hall, 1997). His
spare time,” in Proc 11th USENIX Security Symp., 2002, pp. 149–167. current research interests include information security and computer networks.
[6] U.S. Department of Justice. Computer Crime and Intellectual Property Dr. Wu is an author and co-author of over 50 journal papers in IEEE
Section. [Online] Available: http://www.usdoj.gov/criminal/cyber- transactions, physical reviews, and in journals such as Applied Physics Letters,
crime/ccpolicy.html#DDSA Applied Optics, and the Journal of Parallel and Distributed Computing, as well
[7] Y. Tipsuwan, M.-Y. Chow, and R. Vanijjirattikhan, “An implementation as in over 110 conference publications. He has served as committee member
of a networked PI controller over IP network,” in Proc. 29th Conf. IEEE and referee for numerous conferences and journals, as Guest Editor for the
Industrial Electronics Soc., Roanoke, VA, Nov. 2003, pp. 2805–2810. IEEE TRANSACTIONS ON PLASMA SCIENCE and IEEE TRANSACTIONS ON
[8] Y. Tipsuwan and M.-Y. Chow, “Neural network middleware for model INDUSTRIAL ELECTRONICS, and as Associate Editor of IEEE TRANSACTIONS
predictive path tracking of networked mobile robot over IP network,” in ON INDUSTRIAL ELECTRONICS. He received the IEEE TRANSACTIONS ON
Proc. 29th Conf. IEEE Industrial Electronics Soc., Roanoke, VA, Nov. INDUSTRIAL ELECTRONICS 1997 Outstanding Paper Award. He is a member of
2003, pp. 1419–1424. Sigma Xi and Eta Kappa Nu.
[9] S. Soucek, T. Sauter, and G. Koller, “Effect of delay jitter on quality of
control in EIA-852-based networks,” in Proc. 29th Conf. IEEE Industrial
Electronics Soc., Roanoke, VA, Nov. 2003, pp. 1431–1436.
[10] J. Yepez, P. Marti, and J. Fuertes, “Control loop performance analysis John Y. Hung (S’79–M’80–SM’93) received the
over networked control system,” in Proc. 28th Conf. IEEE Industrial B.S. degree from the University of Tennessee,
Electronics Soc., Sevilla, Spain, Nov. 2002, pp. 2881–2885. Knoxville, in 1979, the M.S.E. degree from
[11] K. Brady and T.-J. Tarn, “Internet-based teleoperation,” in Proc. 27th Princeton University, Princeton, NJ, in 1981, and
Conf. IEEE Industrial Electronics Soc., Denver, CO, Nov. 2001, pp. the Ph.D. degree from the University of Illinois,
644–649. Urbana–Champaign, in 1989, all in electrical engi-
[12] J. Woo and J. Lee, “Transmission modeling and simulation for Internet- neering.
based control,” in Proc. 27th Conf. IEEE Industrial Electronics Soc., From 1981 to 1985, he was with Johnson Controls,
Denver, CO, Nov. 2001, pp. 165–169. Milwaukee, WI, developing microprocessor-based
[13] A. Weaver, “Survey of industrial information technology,” in Proc. 27th controllers for commercial heating, ventilation,
Conf. IEEE Industrial Electronics Soc., Denver, CO, Nov. 2001, pp. and air conditioning systems. From 1985 to 1989,
2056–2061. he was a Consultant Engineer with Poly-Analytics, Inc. In 1989, he joined
[14] L. Kleinrock, Queueing Systems: Volume I—Theory. New York: Auburn University, Auburn, AL, where he is currently an Associate Professor
Wiley, 1976, pp. 8–9. of Electrical and Computer Engineering. His teaching and research interests
[15] National Laboratory for Applied Network Research. Active Mea- include nonlinear control systems and signal processing with applications in
surement Project. [Online] Available: http://watt.nlanr.net/ac- process control, robotics, electric machinery, and power electronics. He is
tive/maps/ampmap_active.php holds two U.S. patents in the area of control systems.
[16] Internet 2. One-Way Latency Measurement. [Online] Available: Prof. Hung has received several awards for his teaching and research, in-
http://abilene.internet2.edu/ami/owamp_status_map.cgi/now cluding a Best Paper Award from the IEEE TRANSACTIONS ON INDUSTRIAL
[17] T. Karagiannis, M. Molle, M. Faloutsos, and A. Broido, “A nonsta- ELECTRONICS. He has been an Associate Editor of the IEEE TRANSACTIONS
tionary Poisson view of Internet traffic,” in Proc. 23rd Conf. IEEE In- ON CONTROL SYSTEM TECHNOLOGY (1997–1998), and is an Associate Editor
focom, Hong Kong, 2004. of the IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS. He served as Tech-
[18] H. Aljifri, “IP traceback: a new denial-of-service deterrent,” IEEE Secu- nical Program Co-Chair for the 2000 IEEE International Conference on Indus-
rity & Privacy Mag., vol. 1, no. 3, pp. 24–31, May–Jun. 2003. trial Technology (Goa, India) and the 2000 IEEE International Symposium on
[19] R. Chang, “Defending against flooding-based distributed denial-of-ser- Industrial Electronics (Puebla, Mexico). He also serves as Treasurer of the IEEE
vice attacks: a tutorial,” IEEE Commun. Mag., pp. 42–51, Oct. 2002. Industrial Electronics Society.
Authorized licensed use limited to: BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE. Downloaded on November 06,2024 at 11:16:52 UTC from IEEE Xplore. Restrictions apply.