A real-time anomaly-based IDS for cyber-attack detection at the industrial process level of Critical Infrastructures

被引:25
作者
Clotet, Xavier [1 ]
Moyano, Jose [1 ]
Leon, Gladys [1 ]
机构
[1] Aplicac Informat Avanzada SL, Sant Cugat Del Valles, Spain
关键词
Critical Infrastructure Protection; Cyber security; Negative selection algorithm; Intrusion detection system; Anomaly detection; Industrial process level of critical; infrastructures;
D O I
10.1016/j.ijcip.2018.08.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a real time anomaly-based detection system designed to work at the industrial process level of Critical Infrastructures (CI). The system's core algorithm is based on negative selection and works in two phases: it first learns from the normal behaviour of the process, and then performs detection and raises alarms each time an abnormal behaviour is found. The main goal of the proposed tool is the detection of attacks targeting the physical components or devices composing the industrial process level of CI such as electric, gas or water utilities. The proposed IDS uses a multi-agent approach to tackle the complex problem of monitoring large amounts of data coming from measurements recorded by Industrial Control Systems. It was built on an open source distributed computation system for real time analysis. This tool was developed, tested, and validated during the EU-funded project PREEMPTIVE. Detection results obtained on a water treatment plant laboratory are presented and discussed. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:11 / 20
页数:10
相关论文
共 25 条
[1]   Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant [J].
Adepu, Sridhar ;
Mathur, Aditya .
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :449-460
[2]   Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions [J].
Adepu, Sridhar ;
Mathur, Aditya .
PROCEEDINGS OF THE SINGAPORE CYBER-SECURITY CONFERENCE (SG-CRC) 2016: CYBER-SECURITY BY DESIGN, 2016, 14 :59-74
[3]  
[Anonymous], 2014, PREV METH TOOLS PROT
[4]  
[Anonymous], THESIS
[5]  
CRISALIS, 2012, CRIT INFR SEC AN
[6]   Recent Advances in Artificial Immune Systems: Models and Applications [J].
Dasgupta, Dipankar ;
Yu, Senhua ;
Nino, Fernando .
APPLIED SOFT COMPUTING, 2011, 11 (02) :1574-1587
[7]  
ENISA, 2017, EUR UN AG NETW INF S
[8]   Negative representations of information [J].
Esponda, Fernando ;
Forrest, Stephanie ;
Helman, Paul .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (05) :331-345
[9]  
Etcheves Miciolino E., 2017, INT J CRITICAL INFRA
[10]  
FORREST S, 1994, 1994 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY, PROCEEDINGS, P202