Anomaly detection in Industrial Control Systems using Logical Analysis of Data

被引:66
作者
Das, Tanmoy Kanti [1 ]
Adepu, Sridhar [2 ]
Zhou, Jianying [2 ]
机构
[1] Natl Inst Technol Raipur, Dept Comp Applicat, Raipur, Madhya Pradesh, India
[2] Singapore Univ Technol & Design, Ctr Res Cyber Secur, iTrust, Singapore, Singapore
关键词
Anomaly detection; Industrial control system; Near real-time detection; Localization of anomaly; Logical Analysis of Data; INTRUSION-DETECTION; IMPLEMENTATION; SECURITY;
D O I
10.1016/j.cose.2020.101935
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber attacks on Industrial Control Systems (ICSs) to disrupt the associated physical systems, like power grids and water treatment plants, are a harsh reality of the world today. Detection and prevention of anomalous behaviors such as cyber attacks are of vital importance. This paper focuses on a method to detect such anomalous behaviors in near real-time using laptop class processing power. ICSs depend on the sensor measurements to monitor and operate a plant. Moreover, any change in the behaviors of a physical process due to an attack can also be unearthed from the sensor measurements. Under different circumstances, these sensor measurements follow typical patterns. A partially defined Boolean function based supervised classification method, known as Logical Analysis of Data (LAD), can extract patterns (or rules) from historical sensor measurements, and these rules can categorize the condition of a plant. In this paper, these rules are used to design an Anomaly Detection System (ADS) to unearth anomalous behaviors. The efficacy of the proposed method is assessed using the sensor measurements from a testbed known as Secure Water Treatment (SWaT) system. The proposed technique is generic and can be extended to other ICSs such as power and transportation. Additionally, compared to other anomaly detection approaches, LAD-based ADS also helps to localize the anomaly. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 60 条
[1]   ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers [J].
Abbasi, Ali ;
Holz, Thorsten ;
Zambon, Emmanuele ;
Etalle, Sandro .
33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, :437-448
[2]   C-FLAT: Control-Flow Attestation for Embedded Systems Software [J].
Abera, Tigist ;
Asokan, N. ;
Davi, Lucas ;
Ekberg, Jan-Erik ;
Nyman, Thomas ;
Paverd, Andrew ;
Sadeghi, Ahmad-Reza ;
Tsudik, Gene .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :743-754
[3]  
Abrams M., 2008, MALICIOUS CONTROL SY, V1, P1
[4]   Distributed Attack Detection in a Water Treatment Plant: Method and Case Study [J].
Adepu, Sridhar ;
Mathur, Aditya .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) :86-99
[5]   Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant [J].
Adepu, Sridhar ;
Mathur, Aditya .
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :449-460
[6]   NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems [J].
Ahmed, Chuadhry Mujeeb ;
Ochoa, Martin ;
Zhou, Jianying ;
Mathur, Aditya P. ;
Qadeer, Rizwan ;
Murguia, Carlos ;
Ruths, Justin .
PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, :483-497
[7]   Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS [J].
Ahmed, Chuadhry Mujeeb ;
Zhou, Jianying ;
Mathur, Aditya P. .
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, :566-581
[8]   Logical analysis of data - the vision of Peter L. Hammer [J].
Alexe, Gabriela ;
Alexe, Sorin ;
Bonates, Tiberius O. ;
Kogan, Alexander .
ANNALS OF MATHEMATICS AND ARTIFICIAL INTELLIGENCE, 2007, 49 (1-4) :265-312
[9]   LEARNING BOOLEAN CONCEPTS IN THE PRESENCE OF MANY IRRELEVANT FEATURES [J].
ALMUALLIM, H ;
DIETTERICH, TG .
ARTIFICIAL INTELLIGENCE, 1994, 69 (1-2) :279-305
[10]   Cyber Security of Water SCADA Systems-Part II: Attack Detection Using Enhanced Hydrodynamic Models [J].
Amin, Saurabh ;
Litrico, Xavier ;
Sastry, S. Shankar ;
Bayen, Alexandre M. .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013, 21 (05) :1679-1693