Anomaly detection in Industrial Control Systems using Logical Analysis of Data

被引:66
作者
Das, Tanmoy Kanti [1 ]
Adepu, Sridhar [2 ]
Zhou, Jianying [2 ]
机构
[1] Natl Inst Technol Raipur, Dept Comp Applicat, Raipur, Madhya Pradesh, India
[2] Singapore Univ Technol & Design, Ctr Res Cyber Secur, iTrust, Singapore, Singapore
关键词
Anomaly detection; Industrial control system; Near real-time detection; Localization of anomaly; Logical Analysis of Data; INTRUSION-DETECTION; IMPLEMENTATION; SECURITY;
D O I
10.1016/j.cose.2020.101935
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber attacks on Industrial Control Systems (ICSs) to disrupt the associated physical systems, like power grids and water treatment plants, are a harsh reality of the world today. Detection and prevention of anomalous behaviors such as cyber attacks are of vital importance. This paper focuses on a method to detect such anomalous behaviors in near real-time using laptop class processing power. ICSs depend on the sensor measurements to monitor and operate a plant. Moreover, any change in the behaviors of a physical process due to an attack can also be unearthed from the sensor measurements. Under different circumstances, these sensor measurements follow typical patterns. A partially defined Boolean function based supervised classification method, known as Logical Analysis of Data (LAD), can extract patterns (or rules) from historical sensor measurements, and these rules can categorize the condition of a plant. In this paper, these rules are used to design an Anomaly Detection System (ADS) to unearth anomalous behaviors. The efficacy of the proposed method is assessed using the sensor measurements from a testbed known as Secure Water Treatment (SWaT) system. The proposed technique is generic and can be extended to other ICSs such as power and transportation. Additionally, compared to other anomaly detection approaches, LAD-based ADS also helps to localize the anomaly. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 60 条
[21]   Go with the Flow: Toward Workflow-Oriented Security Assessment [J].
Chen, Binbin ;
Kalbarczyk, Zbigniew ;
Nicol, David M. ;
Sanders, William H. ;
Tan, Rui ;
Temple, William G. ;
Tippenhauer, Nils Ole ;
An Hoa Vu ;
Yau, David K. Y. .
PROCEEDINGS OF THE 2013 NEW SECURITY PARADIGMS WORKSHOP (NSPW'13), 2013, :65-76
[22]   Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System [J].
Chen, Yuqi ;
Poskitt, Christopher M. ;
Sun, Jun .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :648-660
[23]   Towards Learning and Verifying Invariants of Cyber-Physical Systems by Code Mutation [J].
Chen, Yuqi ;
Poskitt, Christopher M. ;
Sun, Jun .
FM 2016: FORMAL METHODS, 2016, 9995 :155-163
[24]   Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks [J].
Cheng, Long ;
Tian, Ke ;
Yao, Danfeng .
33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, :315-326
[25]  
Crama Y., 1988, Annals of Operations Research, V16, P299, DOI 10.1007/BF02283750
[26]   AN INTRUSION-DETECTION MODEL [J].
DENNING, DE .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :222-232
[27]  
Feng C, 2019, 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), DOI [10.14722/ndss.2019.23265, 10.1109/imbioc.2019.8777851]
[28]   HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems [J].
Ghaeini, Hamid Reza ;
Tippenhauer, Nils Ole .
CPS-SPC'16: PROCEEDINGS OF THE 2ND ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY, 2016, :101-109
[29]   A Survey of Security in SCADA Networks: Current Issues and Future Challenges [J].
Ghosh, Sagarika ;
Sampalli, Srinivas .
IEEE ACCESS, 2019, 7 :135812-135831
[30]   A Dataset to Support Research in the Design of Secure Water Treatment Systems [J].
Goh, Jonathan ;
Adepu, Sridhar ;
Junejo, Khurum Nazir ;
Mathur, Aditya .
CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2016), 2018, 10242 :88-99