Detecting control system misbehavior by fingerprinting programmable logic controller functionality

被引:8
作者
Stockman, Melissa [1 ]
Dwivedi, Dipankar [1 ]
Gentz, Reinhard [1 ]
Peisert, Sean [1 ]
机构
[1] Lawrence Berkeley Natl Lab, One Cyclotron Rd, Berkeley, CA 94720 USA
关键词
programmable logic controller; cybersecurity; side channels; cyber-physical systems; machine learning;
D O I
10.1016/j.ijcip.2019.100306
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, attacks such as the Stuxnet malware have demonstrated that cyberattacks against control systems cause extensive damage. These attacks can result in physical damage to the networked systems under their control. In this paper, we discuss our approach for detecting such attacks by distinguishing between programs running on a programmable logic controller (PLC) without having to monitor communications. Using power signatures generated by an attached, high-frequency power measurement device, we can identify what a PLC is doing and when an attack may have altered what the PLC should be doing. To accomplish this, we generated labeled data for testing our methods and applied feature engineering techniques and machine learning models. The results demonstrate that Random Forests and Convolutional Neural Networks classify programs with up to 98% accuracy for major program differences and 84% accuracy for minor differences. Our results can be used for both online and offline applications. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:9
相关论文
共 21 条
[1]  
Abbasi A., 2016, P BLACK HAT EUR BLAC
[2]   Application of deep convolutional neural network for automated detection of myocardial infarction using ECG signals [J].
Acharya, U. Rajendra ;
Fujita, Hamido ;
Oh, Shu Lih ;
Hagiwara, Yuki ;
Tan, Jen Hong ;
Adam, Muhammad .
INFORMATION SCIENCES, 2017, 415 :190-198
[3]   Trojan detection using IC fingerprinting [J].
Agrawal, Dakshi ;
Baktir, Selcuk ;
Karakoyunlu, Deniz ;
Rohatgi, Pankaj ;
Sunar, Berk .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :296-+
[4]  
[Anonymous], 1998, HDB BRAIN THEORY NEU
[5]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[6]  
Butterworth S., 1930, On the theory of filter amplifiers, V7, P536, DOI DOI 10.1109/JOE.2021.3107590
[7]  
Carmeli Y., 2015, THESIS
[8]   AN ALGORITHM FOR MACHINE CALCULATION OF COMPLEX FOURIER SERIES [J].
COOLEY, JW ;
TUKEY, JW .
MATHEMATICS OF COMPUTATION, 1965, 19 (90) :297-&
[9]  
Copos B., 2017, THESIS
[10]   ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds [J].
Gao, Xing ;
Gu, Zhongshu ;
Kayaalp, Mehmet ;
Pendarakis, Dimitrios ;
Wang, Haining .
2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2017, :237-248