Protocol study and anomaly detection for server-driven traffic in SCADA networks

被引:6
作者
Lin, Chih-Yuan [1 ]
Nadjm-Tehrani, Simin [1 ]
机构
[1] Linkoping Univ, Comp & Informat Sci, S-58183 Linkoping, Sweden
关键词
SCADA; Anomaly detection; Traffic characterization; IEC-104; MMS; S7; Server-driven; INTRUSION DETECTION;
D O I
10.1016/j.ijcip.2023.100612
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attacks against Supervisory Control and Data Acquisition (SCADA) systems operating critical infrastructures have largely appeared in the past decades. There are several anomaly detection systems that model the traffic of request-response mechanisms, where a client initiates a request to a server and the server sends back a response later. However, many modern SCADA protocols also allow server-driven traffic without a paired request, and anomaly detection for server-driven traffic has not been well-studied. This paper provides a comprehensive understanding of server-driven traffic across different protocols, such as MMS, Siemens S7, S7-plus, and IEC 60870-5-104 (IEC-104), with traffic analysis. The analysis results show that the common postulation of periodicity and correlation within SCADA traffic holds true for most of the analyzed datasets. The paper then proposes a Multivariate Correlation Anomaly Detection (MCAD) approach for server-driven traffic that presents complicated correlations among flows. The proposed approach is compared with a univariate correlation anomaly detection approach designed for SCADA and a general purpose anomaly detection approach based on neural network techniques. These approaches are tested with an IEC-104 dataset from a real power utility with injected timing perturbations resulting from a Stuxnet-like stealthy attack scenario. The detection accuracy of MCAD outperforms the compared methods and the time-to-detection performance is promising.
引用
收藏
页数:19
相关论文
共 58 条
[1]  
Adepu Sridhar, 2019, Computer Security. ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018. Revised Selected Papers: Lecture Notes in Computer Science (LNCS 11387), P37, DOI 10.1007/978-3-030-12786-2_3
[2]  
Ahmed C.M., 2020, LNCS
[3]   SCADA Systems: Challenges for Forensic Investigators [J].
Ahmed, Irfan ;
Obermeier, Sebastian ;
Naedele, Martin ;
Richard, Golden G., III .
COMPUTER, 2012, 45 (12) :44-51
[4]   Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems [J].
Aoudi, Wissam ;
Iturbe, Mikel ;
Almgren, Magnus .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :817-831
[5]  
Aoudi Wissam, 2021, 2021 AUSTR COMP SCI, P1, DOI [10.1145/3437378.3437393, DOI 10.1145/3437378.3437393]
[6]  
Audibert Julien, 2020, P 26 ACM SIGKDD INT
[7]  
Barbosa R.R.R., 2012, PASSIVE ACTIVE MEASU
[8]   Exploiting traffic periodicity in industrial control networks [J].
Barbosa, Rafael Ramos Regis ;
Sadre, Ramin ;
Pras, Aiko .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2016, 13 :52-62
[9]  
Bishop C., 2006, Pattern Recognition and Machine Learning
[10]  
Bishop C.M., 2006, PATTERN RECOGN, P27