Standard specification-based intrusion detection for hierarchical industrial control systems

被引:6
作者
Hotellier, Estelle [1 ,2 ]
Sicard, Franck [1 ]
Francq, Julien [1 ]
Mocanu, Stephane [2 ]
机构
[1] Naval Grp, Naval Cyber Lab, F-83190 Ollioules, France
[2] Univ Grenoble Alpes, Lab Informat Grenoble, CNRS, Inria,Grenoble INP, F-38000 Grenoble, France
关键词
Industrial control system; Intrusion detection system; Specification; Temporal logic; Runtime monitoring; SECURITY; SAFETY;
D O I
10.1016/j.ins.2024.120102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we develop a specification -based, process -aware, Intrusion Detection System (IDS) for complex Industrial Control Systems (ICSs). Complex ICSs are distributed and hierarchical control systems built on top of local control loops which are the system's elementary building blocks. Process -aware attacks are sophisticated cyberattacks that aim to compromise the safety of the controlled physical process. Our approach aims to link safety specifications and security properties. Thus, we use international and industry standards specifications concerning local safety, global safety and networks of the industrial process, in order to obtain security properties. The obtained security properties are cybersecurity related requirements. They are translated into security patterns in order to be runtime monitored by our network IDS. This latter relies on a distributed monitoring framework, capturing network traffic between the local loops and the distributed control level, as well as between distributed control and supervisory control. We implemented and evaluated our IDS on a real ICS. We experimentally show that our IDS detects a large spectrum of attacks. We also show that our distributed IDS is scalable since its detection response time as a function of the number of monitored security patterns, is linear. A demonstrator comprising code extracts is made available.
引用
收藏
页数:20
相关论文
共 50 条
[1]   ARTINALI: Dynamic Invariant Detection for Cyber-Physical System Security [J].
Aliabadi, Maryam Raiyat ;
Kamath, Amita Ajith ;
Gascon-Samson, Julien ;
Pattabiraman, Karthik .
ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2017, :349-361
[2]  
[Anonymous], 2010, IEC 62264
[3]  
[Anonymous], 2013, IEC 61131-3
[4]  
[Anonymous], 2011, CiA 301-4.2.0
[5]  
[Anonymous], 2009, IEC 62443 security for industrial automation and control systems, standard
[6]  
[Anonymous], 2002, CiA 404-1.2.0
[7]  
[Anonymous], 2021, IEC 61800
[8]  
[Anonymous], 2022, 61850 IEC
[9]  
Babiak T, 2012, LECT NOTES COMPUT SC, V7214, P95, DOI 10.1007/978-3-642-28756-5_8
[10]  
Bartocci Ezio, 2018, Lectures on Runtime. Verification Introductory and Advanced Topics. LNCS 10457, P1, DOI 10.1007/978-3-319-75632-5_1