Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks

被引:45
作者
Vollmer, Todd [1 ]
Manic, Milos [2 ]
机构
[1] Idaho Natl Lab, Idaho Falls, ID 83415 USA
[2] Univ Idaho, Idaho Falls, ID 83402 USA
关键词
Industrial control; intrusion detection; network security;
D O I
10.1109/TII.2014.2304633
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, an established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.
引用
收藏
页码:1337 / 1347
页数:11
相关论文
共 34 条
[1]  
[Anonymous], INT J PHOTOENERGY
[2]  
[Anonymous], 2008, NMAP NETWORK SCANNIN
[3]   SinFP, unification of active and passive operating system fingerprinting [J].
Auffret, Patrice .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2010, 6 (03) :197-205
[4]  
Automation Rockwell, 2005, ROCKW AUT PUBL
[5]   A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems [J].
Carcano, A. ;
Coletta, A. ;
Guglielmi, M. ;
Masera, M. ;
Fovino, I. Nai ;
Trombetta, A. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2011, 7 (02) :179-186
[6]  
Defense Advanced Research Projects Agency, 1981, 791 DARPA RFC
[7]  
Digital Bond Incorporated, SCADA HON
[8]  
Dillinger, 2005, SAND20052846P SAND N
[9]  
Fonseca R., 2005, EECS200524 U CAL
[10]   A hybrid approach to operating system discovery based on diagnosis [J].
Gagnon, F. ;
Esfandiari, B. .
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2011, 21 (02) :106-119