Multi-step attack detection in industrial control systems using causal analysis

被引:10
作者
Jadidi, Zahra [1 ,2 ]
Hagemann, Joshua [1 ]
Quevedo, Daniel [3 ]
机构
[1] Queensland Univ Technol, Sch Comp Sci, Brisbane, Australia
[2] Griffith Univ, Sch Informat & Commun Technol, Brisbane, Australia
[3] Queensland Univ Technol, Sch Elect Engn & Robot, Brisbane, Australia
关键词
Attack detection; Causality analysis; Industrial control systems; Multi -step attacks;
D O I
10.1016/j.compind.2022.103741
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In the old generation of industrial control systems (ICSs), their sub-components communicated within private networks and, therefore, it was assumed that ICSs are safe from cyber-attacks. However, new advanced ICS sub-components need Internet connectivity to control and monitor their geographically dispersed structure. Connection to corporate networks and the public Internet create various security issues. The increasing number of attacks has become a serious threat for ICS networks. These sophisticated attacks use multiple steps and affect different devices. A major weakness of existing attack detection methods is that they only detect attacks and they do not help security analysts identify the cause and effect of attacks. Therefore, manual analysis is required to identify and isolate the cause of the attack. Causal analysis can help to track the propagation of an attack. While there is weak security in ICS networks, there is not sufficient research in the causal analysis of attacks in these networks. To address this research gap in ICS networks, we present a solution that detects the causal impact of attacks by investigating causal dependencies in ICS logs. Our ICS causal anomaly detection (ICS-CAD) method consists of two phases. It initially detects attacks and identifies the ICS device generating the malicious traffic. Secondly, it analyses causal relationships between ICS logs to diagnose the attacker's future effect. We use a causal decomposition method to discover causality relationships in ICS logs. The performance of the ICS-CAD is evaluated using two datasets collected in real-world ICS networks. The ICS-CAD provides 98% accuracy in detecting attacks and the causal impact of the detected attacks.
引用
收藏
页数:9
相关论文
共 36 条
  • [1] DAICS: A Deep Learning Solution for Anomaly Detection in Industrial Control Systems
    Abdelaty, Maged
    Doriguzzi-Corin, Roberto
    Siracusa, Domenico
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (02) : 1117 - 1129
  • [2] Discrimination of Genuine and Acted Emotional Expressions Using EEG Signal and Machine Learning
    Alex, Meera
    Tariq, Usman
    Al-Shargie, Fares
    Mir, Hasan S.
    Al Nashash, Hasan
    [J]. IEEE ACCESS, 2020, 8 : 191080 - 191089
  • [3] A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities
    Alshamrani, Adel
    Myneni, Sowmya
    Chowdhary, Ankur
    Huang, Dijiang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1851 - 1877
  • [4] AnonMississippi State University Critical Infrastructure Protection Center, 2022, IND CONTR SYST CYB A
  • [5] Chakraborty Sayan, 2019, 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA), P523, DOI 10.1109/ICMLA.2019.00098
  • [6] Chalapathy R, 2019, Arxiv, DOI arXiv:1901.03407
  • [7] Chang Jin., 2016, 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB), P1, DOI [10.1109/ICCPCT.2016.7530239, DOI 10.1002/14651858.CD201601]
  • [8] Elmrabit N, 2020, 2020 INT C CYBER SEC, P1, DOI [DOI 10.1109/CYBERSECURITY49315.2020.9138871, 10.1109/cybersecurity49315.2020.9138871]
  • [9] Farrukh Yasir Ali, 2021, 2021 North American Power Symposium (NAPS), DOI 10.1109/NAPS52732.2021.9654767
  • [10] Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM networks
    Feng, Cheng
    Li, Tingting
    Chana, Deeph
    [J]. 2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2017, : 261 - 272