Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas...

47
Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering University of Waterloo Miroslav Pajic, Rahul Mangharam, George Pappas Electrical and Systems Engineering University of Pennsylvania Christoforos Hadjicostis Electrical and Computer Engineeri University of Cyprus Collaborators

Transcript of Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas...

Page 1: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Using Structured System Theory to Identify Malicious Behavior

in Distributed Systems

Shreyas SundaramDepartment of Electrical and Computer Engineering

University of Waterloo

Miroslav Pajic, Rahul Mangharam, George Pappas

Electrical and Systems EngineeringUniversity of Pennsylvania

Christoforos HadjicostisElectrical and Computer Engineering

University of Cyprus

Collaborators

Page 2: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Outline

2

Introduction

Background on Linear and Structured System Theory

Resilient Information Dissemination in Multi-Agent Networks

Designing an Intrusion Detection System for a Wireless Control Network

Page 3: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Distributed Systems and Networks in Safety-Critical Applications

Airplane Health Monitoring and Management System

Electrical Power Grid

UAV Teams

Credits: Sampigethaya et al. (Digital Avionics Conference 2007), Urban Ecoist, Boeing

Page 4: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Distributed Systems and Networks in Safety-Critical Applications

Airplane Health Monitoring and Management System

Credits: Sampigethaya et al. (Digital Avionics Conference 2007), Urban Ecoist, Boeing

Electrical Power Grid

UAV Teams

Core requirement: disseminate information through network• quickly, efficiently, reliably, securely, …

Page 5: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Problem Formulation

5

Consider a network with nodes {x1, x2, …, xN} e.g., sensors, computers, robots, “agents”, …

Each node can only interact with certain other nodes Assume fixed interaction topology in this talk

Page 6: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Function Calculation Each node xi has some initial value xi[0]

e.g., temperature measurement, position, vote, ... Some nodes must calculate certain functions of these values Special cases

Data accumulation: some nodes gather all values Distributed consensus: all nodes calculate same function

6

?]0[2 ix

?]0[max ix 1.2-0.3

-4.1

2.2

5.07.4

20.1

-6.2

8.5

-1.9

5.9

9.8

-6.3

2.7

3.9

-0.5

2.0 ?]0[ ix

Page 7: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Existing Work on Distributed Function Calculation Distributed function calculation schemes well studied over past

few decades Flooding, tree-based schemes, gossip, token passing, … Communication complexity, computational complexity, time complexity,

fault tolerance, …

Many excellent books on this topic Dissemination of Information in Communication Networks, Hromkovic

et. al., 2005 Communication Complexity, Kushilevitz and Nisan, 1997 Distributed Algorithms, Lynch, 1997 Elements of Distributed Computing, Garg, 2002 Parallel and Distributed Computation, Bertsekas and Tsitsiklis, 1997 …

7

Page 8: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Linear Iterative Strategies Investigate linear iterative strategies for distributed function

calculation At each time-step k, every node updates its value as

Extensively studied for asymptotic consensus For some vector a,

Also studied by communications community: network coding

Survey papers: [Olfati-Saber, Fax & Murray, Proc. IEEE, 2007], [Ren, Beard & Atkins,

Proc. ACC, 2005], [Yeung, Li, Cai, Zhang, 2006]

)(

][][]1[inbrj

jijiiii kxwkxwkx

8

Nikx Ti

k,,2,1],0[][lim

xa

Page 9: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Potential for Incorrect Behavior

9

Here, we ask:

“What happens if some nodes don’t follow the linear iterative strategy?”

Faulty nodes: update their values incorrectly due to hardware faults, or stop working altogether

Malicious nodes: willfully update their values incorrectly to prevent other nodes from calculating functions

Related works: [Jadbabaie, Lin & Morse ’03], [Gupta, Langbort & Murray ’06],

[Pasqualetti, Bicchi & Bullo ’07], [Sundaram & Hadjicostis ’08], [Teixeira, Sandberg & Johansson ’10], [Chapman & Mesbahi ’10]

Page 10: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Building Intuition

Node x1 wants to obtain all initial values via some algorithm Node x2 is malicious and pretends x3[0] = 9 Node x4 behaves correctly and uses x3[0] = 5 Node x1 doesn’t know who to believe

i.e., is node x3’s value equal to 9 or 5?

Node x1 needs another node to act as tie-breaker

10

2]0[1 x

0]0[2 x 5]0[3 x

1]0[4 x

x1

x2 x3

x4

Page 11: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Main Results

11

If network has up to b malicious nodes, we show:

Node xi has 2b or fewer node-disjoint paths from

some node xj

Malicious nodes can update their values in such a way that xi

cannot calculate any function of xj’s initial value

Node xi has 2b+1 or more node-disjoint paths from

every other node

xi can obtain all initial values after running linear strategy for

at most N time-steps with almost any weights

Page 12: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Main Results

12

If network has up to b malicious nodes, we show:

Node xi has 2b or fewer node-disjoint paths from

some node xj

Malicious nodes can update their values in such a way that xi

cannot calculate any function of xj’s initial value

Node xi has 2b+1 or more node-disjoint paths from

every other node

“Easy”

“Tricky”

xi can obtain all initial values after running linear strategy for

at most N time-steps with almost any weights

Page 13: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Using Structured System Theory to Analyze Linear Iterations

13

To prove resilience, we use the following approach:

Linear strategy is resilient to b malicious

nodes in a given network

A graph has some property “Q”

Original network has connectivity 2b+1

A linear system has some property “P”

(Structured System Theory)

Page 14: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Background on Linear and Structured

System Theory

Page 15: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Properties of Linear Systems

15

Controllability: drive state to desired value using input

Observability: determine state from output, with input known (or zero)

Strong Observability: determine state from output, with input unknown

Invertibility: determine input from output, with state known

][][

][][]1[

kCxky

kBukAxkx

State: x 2 n,

Output: y 2 p,Input: u 2 m

Page 16: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Properties of Linear Systems

16

Controllability: drive state to desired value using input

Observability: determine state from output, with input known (or zero)

Strong Observability: determine state from output, with input unknown

Invertibility: determine input from output, with state known

][][

][][]1[

kCxky

kBukAxkx

State: x 2 n,

Output: y 2 p,Input: u 2 m

Page 17: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Properties of Linear Systems

17

Controllability: drive state to desired value using input

Observability: determine state from output, with input known (or zero)

Strong Observability: determine state from output, with input unknown

Invertibility: determine input from output, with state known

][][

][][]1[

kCxky

kBukAxkx

State: x 2 n,

Output: y 2 p,Input: u 2 m

Standard Approach: Use algebraic tests to determine if properties hold

Page 18: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Linear Structured Systems

18

System is structured if every entry of the matrices (A,B,C) is either zero, or an independent free parameter

Used to represent and analyze dynamical systems with unknown/uncertain parameters [Lin ‘74, Dion et al., ‘03]

Structured system theory: determines properties of systems based on the zero/nonzero structure of matrices

][][

][][]1[

kCxky

kBukAxkx

mpn uyx ,,

Page 19: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Structural Properties

19

“Structured system has property P”: Property P holds for at least one choice of free parameters in the matrices (A, B, C)

Structural properties are generic!

Use graph based techniques to determine if structural properties hold

Structured system has property P

Structured system will have property P for almost any choice

of free parameters

Page 20: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Example of Structured System and Associated Graph

20

Structured system can be represented as a graph Structured system:

Associated graph H:

1 2 7

3 4 5

8

6

0 0 0

0 0 0[ 1] [ ] [ ],

0 0 0 0 0

0 0 0 0 0

x k x k u k

][

000

000

000

][

11

10

9

kxky

1

2

3 4 Output vertices:

Y

State vertices: X

Input vertices:

U

Page 21: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Example: Test for Structural Invertibility

21

Theorem [van der Woude, ’91]:

e.g.,

System is structurally invertible

Graph H has m vertex-disjoint paths from inputs to outputs

J. W. van der Woude, Mathematics of Control Systems and Signals, 1991

1

2

3 4 Output vertices:

Y

State vertices: X

Input vertices:

U

Page 22: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Example: Test for Structural Invertibility

22

Theorem [van der Woude, ’91]:

e.g.,

System is structurally invertible

Graph H has m vertex-disjoint paths from inputs to outputs

J. W. van der Woude, Mathematics of Control Systems and Signals, 1991

1

2

3 4 Output vertices:

Y

State vertices: X

Input vertices:

U

Structurally Invertible

Page 23: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

References on Structured Systems

23

C. T. Lin, “Structural Controllability”, IEEE TAC, 1974 K. J. Reinschke, Multivariable Control: A Graph-Theoretic

Approach, 1988 J-M. Dion, C. Commault and J. van der Woude, “Generic

Properties and Control of Linear Structured Systems: A Survey”, Automatica, 2003

D. D. Siljak, Decentralized Control of Complex Systems, 1991 Sundaram & Hadjicostis, CDC 2009, ACC 2010 (Structural

properties over finite fields, upper bound on generic controllability/observability indices)

Page 24: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Application to Resilient Information Dissemination

Page 25: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Modeling Faulty/Malicious Behavior in Linear Iterative Strategies

25

Linear iterative strategy for information dissemination:

Correct update equation for node xi:

Faulty or malicious update by node xi:

fi[k] is an additive error at time-step k Note: this model allows node xi to update its value in a

completely arbitrary manner

)(

][][]1[inbrj

jijiiii kxwkxwkx

( )

[ 1] [ ] [ ] [ ]i ii i ij j ij nbr i

x k w x k w x k f k

Page 26: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Modeling the Values Seen by Each Node

26

Each node obtains neighbors’ values at each time-step Let yi[k] = Cix[k] denote values seen by xi at time-step k

Rows of Ci index portions of x[k] available to xi

][

1000

0100

0001

][

][

][

][

3

4

3

1

3 k

kx

kx

kx

k xy

C

For node x3:

x4

x3

x2

x1

Page 27: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Linear Iteration with Faulty/Malicious Nodes

27

Let S = {xi1, xi2

, …, xib} be set of faulty/malicious nodes

Unknown a priori, but bounded by b

Update equation for entire system:1

2

1 2

1 11 1 1

1

[ 1] [ ]

[ ]

[ ][ 1] [ ]

[ ]

[ 1] [ ][ ]

[ ] [ ]

b

S

b

S

i

Ni

i i i

N N NN N

ik k

k

i i

f kx k w w x k

f k

x k w w x kf k

k k

B

x W x

f

e e e

y C x

Constraint: weight wij = 0 if node xj is not a neighbor of node xi

Page 28: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Recovering the Initial State

28

System model for linear iteration with malicious nodes

Objective: Recover initial state x[0] from outputs of the system, without knowing fS[k]

Almost equivalent to strong observability of system The set S is also unknown here Only know it has at most b elements

[ 1] [ ] [ ]

[ ] [ ]S S

i i

k k k

k k

x Wx B f

y C x

Page 29: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Recovering the Initial State

29

Want to ensure that the output trajectory uniquely specifies the initial state Same output trajectory must not be generated by two different

initial states and two (possibly) different sets of b malicious nodes

By linearity, can show:

[ 1] [ ] [ ]

[ ] [ ]S S

i i

k k k

k k

x Wx B f

y C x

Linear system

is strongly observable for any known set Q of 2b nodes

Can recover initial state in system

for any unknown set S of b nodes

[ 1] [ ] [ ]

[ ] [ ]

Q Q

i i

k k k

k k

x Wx B f

y C x

Page 30: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Structural Strong Observability

30

For any set Q of 2b nodes, strong observability of

is a structural property Graph of system is given by graph of original network, with

additional inputs and outputs

Using tests for structural strong observability, we show:

[ 1] [ ] [ ]

[ ] [ ]

Q Q

i i

k k k

k k

x Wx B f

y C x

xi has 2b+1 node-disjoint paths from every other

node

Above system will be strongly observable for any set Q of 2b

nodes

Page 31: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

By generic nature of structural properties:

How long will each node need to wait before the values that it receives uniquely specifies the initial state?

If a linear system is strongly observable, outputs of system over N time-steps are sufficient to determine initial state

Any node can obtain x[0] after at most N time-steps

Robustness of the Linear Iterative Scheme

31

Network is 2b+1 connected

For almost any W, any node can recover all initial values despite actions

of b malicious nodes

Page 32: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Application to Feedback Control:Monitoring for Malicious Behavior in a

Wireless Control Network

Page 33: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Control Over Networks

33

Sensors ( )and Actuators ( ) are installed on a plant Communicate with controllers ( ) over a network Standard architectures:

Wired Control System Wireless Control System

Network primarily used as a channel

PlantController

Plant Controller

Page 34: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Much Work on Networked Control

34

Studied by many researchers Branicky et al., Elia et al., Gupta et al., Hespanha et al., Martins

et al., Murray et al., Nair et al., Seiler et al., Sinopoli et al., Walsh et al., …

Robustness to “network” issues: Packet dropouts, Bernoulli channel failures Delays in the feedback loop

Survey paper: Hespanha et al., Proc IEEE, 2007

Page 35: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

The Wireless Control Network (WCN)

35

Idea: Can we use the wireless network itself as a controller? Leverage the computational capability in the network

Desired properties: Lightweight computation - design for resource constrained

nodes Static transmission schedules Compositionality Handles multiple actuation

and sensing points

Utility: Network can be used as a backup control mechanism in case primary controller fails Uses existing infrastructure, does not require additional hardware

Plant

WCN

Page 36: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Wireless Control Network

36

Plant:

State update procedure, node zi:

Plant update procedure, input i:

Network state vector:

From neighbors From sensors

From actuator’s neighbors

][][

][][]1[

kk

kkk

Cxy

BuAxx

[ 1] [ ] [ ] [ ]j z j zi i

i ii i ij j ij jz s

z k w z k w z k h y k

[ ] [ ]j ai

i ij jz

u k g z k

TN kzkzkzk ][][][][ 21 z

Plant

WCN

Page 37: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Wireless Control Network: A Linear System

37

Network update procedure:

Only elements corresponding to existing links (link weights) are allowed to be non-zero

][][

][][]1[

21

22221

11211

21

22221

11211

21

22221

11211

k

ggg

ggg

ggg

k

k

hhh

hhh

hhh

k

www

www

www

k

mNmm

N

N

NpNN

p

p

NNNN

N

N

zu

yzz

G

HW

Plant

WCN

Page 38: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Closed Loop System

38

Overall system state:

Closed loop system:

Matrices W, G, H are structured Sparsity constraints imposed by the

WCN topology A decentralized control problem

x̂[k] =·x[k]z[k]

¸

Plant

WCN

Page 39: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Stabilizing the Closed Loop System

39

Problem: Find numerical matrices W, H, G satisfying structural constraints so that

Use a numerical design procedure to determine suitable W, H, G Based on Linear Matrix Inequalities Can also be made robust to Bernoulli packet drops

ˆ

A BGA

HC Wis stable

Page 40: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Abnormal Behavior in the Network

40

What if certain nodes in the WCN become faulty or malicious?

Security of control networks in industrial control systems is a major issue [NIST Technical Report, 2008] Data Historian: Maintain and analyze logs of plant and

network behavior Intrusion Detection System: Detect and identify any abnormal

activities

Is it possible to design a Data Historian/Intrusion Detection System for the WCN?

Page 41: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Intrusion Detection System

41

Obvious Solution (?): have IDS listen to transmissions of every node in WCN and double-check whether they are computing correctly Obviously not satisfactory

Can we get by with listening to the transmissions of only a subset T of the nodes? Under what conditions? Which subset should we choose?

Page 42: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Monitored Nodes

42

Denote transmissions of any set T of monitored nodes by

T is a matrix with a single 1 in each row, indicating which elements of z[k] are being monitored

Example:

[ ] [ ]k kt Tz

3 6 3[ ] [ ]xk kT

t 0 I z

T

z1 z4 z7

z2 z5 z8

z3 z6 z9

source node(plant sensor)

WCN

Page 43: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

System Model with Malicious Nodes

43

As before, linear system model for WCN with set S of malicious nodes:

Objective: Recover y[k], fS[k] and S (initial state z[0] assumed known) Almost equivalent to invertibility of system Problem: Don’t know the set of faulty nodes S

Assumption: At most b faulty nodes Must ensure that output sequence cannot be generated by a

different y[k] and possibly different set of b malicious nodes

[ 1] [ ] [ ] [ ]

[ ] [ ]S Sk k k k

k k

z Wz Hy B f

t Tz

Page 44: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Conditions for IDS/Data Historian Design

44

IDS can recover y[k] and identify up to b faulty nodes in the

network by monitoring

transmissions of set T

Can recover inputs and set S in system

for any unknown set S of b nodes

Linear system

is invertible for any known set Q of 2b nodes

There are p+2b node-disjoint paths from sensors and any set Q of 2b nodes

to set T(generically)

[ ][ 1] [ ]

[ ]

[ ] [ ]

SS

kk k

k

k k

yz Wz H B

f

t Tz

[ ][ 1] [ ]

[ ]

[ ] [ ]

QQ

kk k

k

k k

yz Wz H B

f

t Tz

Page 45: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Suppose we want to identify b = 1 faulty/malicious node and recover the plant outputs in this setting:

Consider set Q = {z1,z2}

Example

45

z1 z4 z7

z5 z8

z3 z6 z9

z2

Tp = 1

Q

Page 46: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Example

46

Suppose we want to identify b = 1 faulty/malicious node and recover the plant outputs in this setting:

Consider set Q = {z1,z2} p+2b vertex disjoint paths from sensor and Q to T

Can verify that this holds for any set Q of 2b nodes Can identify any single faulty/malicious node and recover y[k]

z1 z4 z7

z2 z5 z8

z3 z6 z9

Tp = 1

Q

Page 47: Using Structured System Theory to Identify Malicious Behavior in Distributed Systems Shreyas Sundaram Department of Electrical and Computer Engineering.

Summary

47

Analyzed linear iterative strategies in networks with malicious nodes

Key tool: structured system theory Provides graph-theoretic analysis of linear systems

Linear iterative strategies for information dissemination: Robust to b malicious nodes if connectivity of network is 2b+1 or

higher (strong observability)

Linear iterative strategies for stabilization with a wireless network IDS can identify b malicious nodes by monitoring a subset of nodes if

those nodes have enough disjoint paths from other nodes (invertibility)