Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems

被引:27
作者
Kleinmann, Amit [1 ]
Wool, Avishai [1 ]
机构
[1] Tel Aviv Univ, Sch Elect Engn, Tel Aviv, Israel
关键词
ICS; SCADA; network-intrusion-detection-system; Statechart; Siemens; S7; INTRUSION DETECTION; SCADA SYSTEMS; MODBUS/TCP;
D O I
10.1145/3011018
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traffic of Industrial Control System (ICS) between the Human Machine Interface (HMI) and the Programmable Logic Controller (PLC) is known to be highly periodic. However, it is sometimes multiplexed, due to asynchronous scheduling. Modeling the network traffic patterns of multiplexed ICS streams using Deterministic Finite Automata (DFA) for anomaly detection typically produces a very large DFA and a high false-alarm rate. In this article, we introduce a new modeling approach that addresses this gap. Our Statechart DFA modeling includes multiple DFAs, one per cyclic pattern, together with a DFA-selector that de-multiplexes the incoming traffic into sub-channels and sends them to their respective DFAs. We demonstrate how to automatically construct the statechart from a captured traffic stream. Our unsupervised learning algorithms first build a Discrete-Time Markov Chain (DTMC) from the stream. Next, we split the symbols into sets, one per multiplexed cycle, based on symbol frequencies and node degrees in the DTMC graph. Then, we create a sub-graph for each cycle and extract Euler cycles for each sub-graph. The final statechart is comprised of one DFA per Euler cycle. The algorithms allow for non-unique symbols, which appear in more than one cycle, and also for symbols that appear more than once in a cycle. We evaluated our solution on traces from a production ICS using the Siemens S7-0x72 protocol. We also stress-tested our algorithms on a collection of synthetically-generated traces that simulated multiplexed ICS traces with varying levels of symbol uniqueness and time overlap. The algorithms were able to split the symbols into sets with 99.6% accuracy. The resulting statechart modeled the traces with a median false-alarm rate of as low as 0.483%. In all but the most extreme scenarios, the Statechart model drastically reduced both the false-alarm rate and the learned model size in comparison with the naive single-DFA model.
引用
收藏
页数:21
相关论文
共 32 条
[1]   Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant [J].
Adepu, Sridhar ;
Mathur, Aditya .
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :449-460
[2]  
Alcaraz Cristina, 2015, Risks and Security of Internet and Systems. 9th International Conference, CRiSIS 2014. Revised Selected Papers: LNCS 8924, P17, DOI 10.1007/978-3-319-17127-2
[3]  
[Anonymous], 2011, CISC VIS NETW IND GL
[4]  
[Anonymous], TECHNICAL REPORT
[5]  
Atassi A., 2014, STATE ART INTRUSION, P211
[6]  
Briesemeister L., 2010, P 8 INT C PRIV SEC T, P17
[7]  
Byres E. J., 2004, P INT INFR SURV WORK, P1
[8]  
Caselli Marco, 2015, P 1 ACM WORKSH CYB P, P13, DOI [10.1145/2732198.2732200, DOI 10.1145/2732198.2732200]
[9]  
Chen CM, 2013, 2013 IEEE 1ST INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, NETWORKS, AND APPLICATIONS (CPSNA), P13, DOI 10.1109/CPSNA.2013.6614240
[10]  
Cheung S., 2007, Proceedings of the SCADA Security Scientific Symposium, P127