Unknown Attack Traffic Classification in SCADA Network Using Heuristic Clustering Technique

被引:10
作者
Sheng, Chuan [1 ,2 ,3 ]
Yao, Yu [4 ,5 ]
Li, Wenxuan [4 ,5 ]
Yang, Wei [6 ]
Liu, Ying [4 ,5 ]
机构
[1] Chinese Acad Sci, Key Lab Networked Control Syst, Shenyang 110016, Peoples R China
[2] Chinese Acad Sci, Shenyang Inst Automat, Shenyang 110016, Peoples R China
[3] Chinese Acad Sci, Inst Robot & Intelligent Mfg, Shenyang 110169, Peoples R China
[4] Northeastern Univ, Sch Comp Sci & Engn, Minist Educ, Shenyang 110169, Peoples R China
[5] Northeastern Univ, Minist Educ, Engn Res Ctr Secur Technol Complex Network Syst, Shenyang 110169, Peoples R China
[6] Northeastern Univ, Software Coll, Shenyang 110169, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2023年 / 20卷 / 03期
基金
国家重点研发计划;
关键词
Attack traffic classification; heuristic clustering; SCADA network; traffic representation;
D O I
10.1109/TNSM.2023.3238402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attack Traffic Classification (ATC) technique is an essential tool for Industrial Control System (ICS) network security, which can be widely used in active defense, situational awareness, attack source traceback and so on. At present, the state-of-the-art ATC methods are usually based on traffic statistical features and machine learning techniques, including supervised classification methods and unsupervised clustering methods. However, it is difficult for these methods to overcome the problems of lack of attack samples and high real-time requirement in ATC in Supervisory Control and Data Acquisition (SCADA) networks. In order to address the above problems, we propose a self-growing ATC model based on a new density-based heuristic clustering method, which can continuously and automatically detect and distinguish different kinds of unknown attack traffic generated by various attack tools against SCADA networks in real time. An effective representation method of SCADA network traffic is proposed to further improve the performance of ATC. In addition, a large number of experiments are conducted on a compound dataset consisting of the SCADA network dataset, the attack tool dataset and the ICS honeypot dataset, to evaluate the proposed method. The experimental results show that the proposed method outperforms existing state-of-the-art ATC methods in the crucial situation of only normal SCADA network traffic.
引用
收藏
页码:2625 / 2638
页数:14
相关论文
共 43 条
  • [1] Abe S, 2017, 2017 56TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE), P717, DOI 10.23919/SICE.2017.8105603
  • [2] A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT
    Aboelwafa, Mariam M. N.
    Seddik, Karim G.
    Eldefrawy, Mohamed H.
    Gadallah, Yasser
    Gidlund, Mikael
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09): : 8462 - 8471
  • [3] Cyber-physical systems and their security issues
    Alguliyev, Rasim
    Imamverdiyev, Yadigar
    Sukhostat, Lyudmila
    [J]. COMPUTERS IN INDUSTRY, 2018, 100 : 212 - 223
  • [4] An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems
    Almalawi, Abdulmohsen
    Fahad, Adil
    Tari, Zahir
    Alamri, Abdullah
    AlGhamdi, Rayed
    Zomaya, Albert Y.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) : 893 - 906
  • [5] An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
    Almalawi, Abdulmohsen
    Yu, Xinghuo
    Tari, Zahir
    Fahad, Adil
    Khalil, Ibrahim
    [J]. COMPUTERS & SECURITY, 2014, 46 : 94 - 110
  • [6] Assante M.J., 2015, SANS Institute InfoSec Reading Room, V1
  • [7] Barbosa R.R., 2012, Passive and Active Measurement, P126, DOI DOI 10.1007/978-3-642-28537-013
  • [8] Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems
    Cabana, Olivier
    Youssef, Amr M.
    Debbabi, Mourad
    Lebel, Bernard
    Kassouf, Marthe
    Agba, Basile L.
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT (DIMVA 2019), 2019, 11543 : 89 - 108
  • [9] Dharamkar B., 2014, INT J COMPUTER TREND, V7, P100, DOI [10.14445/22312803/IJCTT-V7P106, DOI 10.14445/22312803/IJCTT-V7P106]
  • [10] Dharamkar B., 2014, Int. J. Comput. Appl., V103, P1