Two-Phase Industrial Control System Anomaly Detection Using Communication Patterns and Deep Learning

被引:2
作者
Kim, Sungjin [1 ]
Jo, Wooyeon [2 ]
Kim, Hyunjin [3 ]
Choi, Seokmin [4 ]
Jung, Da-, I [4 ]
Choi, Hyeonho [4 ]
Shon, Taeshik [3 ,5 ]
机构
[1] Samsung SDS, OT Secur Grp, Seoul 03922, South Korea
[2] Virginia Commonwealth Univ, SAFE Lab, ERB 3339 401 Main St, Richmond, VA 23284 USA
[3] Ajou Univ, Dept Comp Engn, Suwon 16499, South Korea
[4] Korea Power Exchange, Informat Secur Team, Naju 58322, South Korea
[5] Ajou Univ, Dept Cybersecur, Suwon 16499, South Korea
基金
新加坡国家研究基金会;
关键词
industrial IoT; industrial; 4.0; anomaly detection; industrial control system; security with deep learning; CYBER; SECURITY;
D O I
10.3390/electronics13081520
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several cases of Industrial Internet of Things (IIoT) attacks with zero-day vulnerabilities have been reported. To prevent these attacks, it is necessary to apply an abnormal behavior detection method; however, there are three main problems that make it hard. First, there are various industrial communication protocols. Instead of IT environments, many unstandardized protocols, which are usually defined by vendors, are used. Second, legacy devices are commonly used, not only EOS (End-of-service), but also EoL (End-of-Life). And last, the analysis of collected data is necessary for defining normal behavior. This behavior should be separately defined in each IIoT. Therefore, it is difficult to apply abnormal behavior detection in environments where economic and human investment is difficult. To solve these problems, we propose a deep learning based abnormal behavior detection technique that utilizes IIoT communication patterns. The proposed method uses a deep learning technique to train periodic data acquisition sequences, which is one of the common characteristics of IIoT. The trained model determined the sequence of packet is normal. The proposed technique can be applied without an additional analysis. The proposed method is expected to prevent security threats by proactively detecting cyberattacks. To verify the proposed method, a dataset was collected from the Korea Electric Power Control System. The model that defines normal behavior based on the application layer exhibits an accuracy of 79.6%. The other model, defining normal behavior based on the transport layer, has an accuracy of 80.9%. In these two models, most false positives and false negatives only occur when the abnormal packet is in a sequence.
引用
收藏
页数:17
相关论文
共 26 条
[1]   NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems [J].
Ahmed, Chuadhry Mujeeb ;
Ochoa, Martin ;
Zhou, Jianying ;
Mathur, Aditya P. ;
Qadeer, Rizwan ;
Murguia, Carlos ;
Ruths, Justin .
PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, :483-497
[2]   Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things [J].
Al-Hawawreh, Muna ;
den Hartog, Frank ;
Sitnikova, Elena .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) :7137-7151
[3]  
[Anonymous], 2000, ICML
[4]   Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems [J].
Chaudhry, Shehzad Ashraf ;
Shon, Taeshik ;
Al-Turjman, Fadi ;
Alsharif, Mohammed H. .
COMPUTER COMMUNICATIONS, 2020, 153 :527-537
[5]   Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach [J].
Choi, Hongjun ;
Lee, Wen-Chuan ;
Aafer, Yousra ;
Fei, Fan ;
Tu, Zhan ;
Zhang, Xiangyu ;
Xu, Dongyan ;
Deng, Xinyan .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :801-816
[6]  
Feng C, 2019, 2019 IEEE MTT-S INTERNATIONAL MICROWAVE BIOMEDICAL CONFERENCE (IMBIOC 2019), DOI [10.1109/imbioc.2019.8777851, 10.14722/ndss.2019.23265]
[7]   Introduction to Industrial Control Networks [J].
Galloway, Brendan ;
Hancke, Gerhard P. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02) :860-880
[8]   Securing IoT Space via Hardware Trojan Detection [J].
Guo, Shize ;
Wang, Jian ;
Chen, Zhe ;
Li, Yubai ;
Lu, Zhonghai .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (11) :11115-11122
[9]  
Huan Yang, 2019, 2019 IEEE Conference on Communications and Network Security (CNS), DOI 10.1109/CNS.2019.8802785
[10]  
ics-cert.kaspersky, Kaspersky ICS Threat Predictions for 2021