Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via Spectral Analysis

被引:12
作者
Kleinmann, Amit [1 ]
Wool, Avishai [1 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Israel
来源
CPS-SPC'16: PROCEEDINGS OF THE 2ND ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY | 2016年
关键词
ICS; SCADA; Network-intrusion-detection-system; Statechart; Siemens; S7; Modbus; INTRUSION DETECTION; MODBUS/TCP;
D O I
10.1145/2994487.2994490
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Traffic of Industrial Control System (ICS) between the Human Machine Interface (HMI) and the Programmable Logic Controller (PLC) is highly periodic. However, it is sometimes multiplexed, due to multi-threaded scheduling. In previous work we introduced a Statechart model which includes multiple Deterministic Finite Automata (DFA), one per cyclic pattern. We demonstrated that Statechart-based anomaly detection is highly effective on multiplexed cyclic traffic when the individual cyclic patterns are known. The challenge is to construct the Statechart, by unsupervised learning, from a captured trace of the multiplexed traffic, especially when the same symbols (ICS messages) can appear in multiple cycles, or multiple times in a cycle. Previously we suggested a combinatorial approach for the Statechart construction, based on Euler cycles in the Discrete Time Markov Chain (DTMC) graph of the trace. This combinatorial approach worked well in simple scenarios, but produced a false-alarm rate that was excessive on more complex multiplexed traffic. In this paper we suggest a new Statechart construction method, based on spectral analysis. We use the Fourier transform to identify the dominant periods in the trace. Our algorithm then associates a set of symbols with each dominant period, identifies the order of the symbols within each period, and creates the cyclic DFAs and the Statechart. We evaluated our solution on long traces from two production ICS: one using the Siemens S7-0x72 protocol and the other using Modbus. We also stress-tested our algorithms on a collection of synthetically-generated traces that simulate multiplexed ICS traces with varying levels of symbol uniqueness and time overlap. The resulting Statecharts model the traces with an overall median false-alarm rate as low as 0.16% on the synthetic datasets, and with zero false-alarms on production S7-0x72 traffic. Moreover, the spectral analysis Statecharts consistently out-performed the previous combinatorial Statecharts, exhibiting significantly lower false alarm rates and more compact model sizes.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 35 条
[1]  
Afcon Technologies, 2015, PULS HMI SOFTW
[2]  
Alcaraz Cristina, 2015, Risks and Security of Internet and Systems. 9th International Conference, CRiSIS 2014. Revised Selected Papers: LNCS 8924, P17, DOI 10.1007/978-3-319-17127-2
[3]  
[Anonymous], 2011, W32.Stuxnet Dossier
[4]  
[Anonymous], 2004, Proceedings of the 2004 ACM SIGMOD international conference on Management of data
[5]  
[Anonymous], TECHNICAL REPORT
[6]  
Atassi A., 2014, STATE ART INTRUSION, P211
[7]  
Barbosa R. R. R., 2012, P IEEE 17 INT C EM T, P1, DOI [10.1109/ETFA.2012.6489745, DOI 10.1109/ETFA.2012.6489745]
[8]  
Briesemeister L., 2010, P 8 INT C PRIV SEC T, P17
[9]  
Byres E. J., 2004, P INT INFR SURV WORK, P1
[10]  
Caselli Marco, 2015, P 1 ACM WORKSH CYB P, P13, DOI [10.1145/2732198.2732200, DOI 10.1145/2732198.2732200]