Using Temporal and Topological Features for Intrusion Detection in Operational Networks

被引:5
作者
Anton, Simon D. Duque [1 ]
Fraunholz, Daniel [1 ]
Schotten, Hans Dieter [1 ]
机构
[1] German Res Ctr AI, Kaiserslautern, Germany
来源
14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019) | 2019年
关键词
Machine Learning; Graph; IT-Security; Industrial Process; Time Series; SYSTEM;
D O I
10.1145/3339252.3341476
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Until two decades ago, industrial networks were deemed secure due to physical separation from public networks. An abundance of successful attacks proved that assumption wrong. Intrusion detection solutions for industrial application need to meet certain requirements that differ from home- and office-environments, such as working without feedback to the process and compatibility with legacy systems. Industrial systems are commonly used for several decades, updates are often difficult and expensive. Furthermore, most industrial protocols do not have inherent authentication or encryption mechanisms, allowing for easy lateral movement of an intruder once the perimeter is breached. In this work, an algorithm for motif discovery in time series, Matrix Profiles, is used to detect outliers in the timing behaviour of an industrial process. This process was monitored in an experimental environment, containing ground truth labels after attacks were performed. Furthermore, the graph representations of a different industrial data set that has been emulated are used to detect malicious activities. These activities can be derived from anomalous communication patterns, represented as edges in the graph. Finally, an integration concept for both methods is proposed.
引用
收藏
页数:9
相关论文
共 51 条
  • [21] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    [J]. COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [22] HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems
    Ghaeini, Hamid Reza
    Tippenhauer, Nils Ole
    [J]. CPS-SPC'16: PROCEEDINGS OF THE 2ND ACM WORKSHOP ON CYBER-PHYSICAL SYSTEMS SECURITY & PRIVACY, 2016, : 101 - 109
  • [23] Greenberg A., 2017, Wired
  • [24] Haller Stephan., 2008, Future Internet - FIS, P14, DOI DOI 10.1007/978-3-642-00985-3_2
  • [25] Detecting Denial-of-Service attacks using the wavelet transform
    Hamdi, Mohamed
    Boudriga, Noureddine
    [J]. COMPUTER COMMUNICATIONS, 2007, 30 (16) : 3203 - 3213
  • [26] Matrix Profile V: A Generic Technique to Incorporate Domain Knowledge into Motif Discovery
    Hoang Anh Dau
    Keogh, Eamonn
    [J]. KDD'17: PROCEEDINGS OF THE 23RD ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2017, : 125 - 134
  • [27] Jyothsna V., 2011, International Journal of Computer Applications, V28, P26
  • [28] SysDetect: A systematic approach to critical state determination for Industrial Intrusion Detection Systems using Apriori algorithm
    Khalili, Abdullah
    Sami, Ashkan
    [J]. JOURNAL OF PROCESS CONTROL, 2015, 32 : 154 - 160
  • [29] Langner Ralph, 2013, TECHNICAL REPORT
  • [30] Lemay A., 2016, 9 WORKSH CYB SEC EXP