DIDEROT: An Intrusion Detection and Prevention System for DNP3-based SCADA Systems

被引:20
作者
Radoglou-Grammatikis, Panagiotis [1 ]
Sarigiannidis, Panagiotis [1 ]
Efstathopoulos, George [2 ]
Karypidis, Paris-Alexandros [3 ]
Sarigiannidis, Antonios [3 ]
机构
[1] Univ Western Macedonia, Dept Elect & Comp Engn, Kozani, Greece
[2] 0infinity Ltd, London, England
[3] SIDROCO HOLDINGS Ltd, Nicosia, Cyprus
来源
15TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2020 | 2020年
基金
欧盟地平线“2020”;
关键词
Anomaly Detection; Autonencoder; Intrusion Detection; Machine Learning; SCADA; SDN; Smart Grid; SECURITY;
D O I
10.1145/3407023.3409314
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, an Intrusion Detection and Prevention System (IDPS) for the Distributed Network Protocol 3 (DNP3) Supervisory Control and Data Acquisition (SCADA) systems is presented. The proposed IDPS is called DIDEROT (Dnp3 Intrusion DetEction pReventiOn sysTem) and relies on both supervised Machine Learning (ML) and unsupervised/outlier ML detection models capable of discriminating whether a DNP3 network flow is related to a particular DNP3 cyberattack or anomaly. First, the supervised ML detection model is applied, trying to identify whether a DNP3 network flow is related to a specific DNP3 cyberattack. If the corresponding network flow is detected as normal, then the unsupervised/outlier ML anomaly detection model is activated, seeking to recognise the presence of a possible anomaly. Based on the DIDEROT detection results, the Software Defined Networking (SDN) technology is adopted in order to mitigate timely the corresponding DNP3 cyberattacks and anomalies. The performance of DIDEROT is demonstrated using real data originating from a substation environment.
引用
收藏
页数:8
相关论文
共 42 条
[1]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[2]  
[Anonymous], 2014, Recent Advances in Engineering and Computational Sciences (RAECS), P1
[3]   The Cousins of Stuxnet: Duqu, Flame, and Gauss [J].
Bencsath, Boldizsar ;
Pek, Gabor ;
Buttyan, Levente ;
Felegyhazi, Mark .
FUTURE INTERNET, 2012, 4 (04) :971-1003
[4]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[5]   Hybrid decision-making method for assessing interdependency and priority of critical infrastructure [J].
Chou, Jui-Sheng ;
Ongkowijoyo, Citra S. .
INTERNATIONAL JOURNAL OF DISASTER RISK REDUCTION, 2019, 39
[6]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[7]  
Di Pinto A., 2018, P BLACK HAT US, P1
[8]  
Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
[9]   Immune System Based Intrusion Detection System (IS-IDS): A Proposed [J].
Dutt, Inadyuti ;
Borah, Samarjeet ;
Maitra, Indra Kanta .
IEEE ACCESS, 2020, 8 :34929-34941
[10]  
East S, 2009, IFIP ADV INF COMM TE, V311, P67