Malicious Anomaly Detection Approaches Robustness in Manufacturing ICSs

被引:1
作者
Beaudet, Amaury [1 ]
Escudero, Cedric [2 ]
Zamai, Eric [2 ]
机构
[1] CNRS, Ampere Lab, INSA Lyon, F-69621 Villeurbanne, France
[2] INSA Lyon, Ampere Lab, F-69621 Villeurbanne, France
来源
IFAC PAPERSONLINE | 2021年 / 54卷 / 01期
关键词
Cyber-security; ICS; Anomaly Detection Systems; Manufacturing Systems; CYBERSECURITY;
D O I
10.1016/j.ifacol.2021.08.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For the past decade, manufacturing Industrial Control Systems (ICSs) have suffered from targeted attacks against their physical system and their control integrity, resulting in financial and material losses. Among protective answers to this malicious threat, Anomaly Detection Systems (ADS) based on behavioral models of the ICS are highly regarded for their ability to detect zero-day attacks. However, the design of accurate and non-obsolescent detection models is not as an easy task in a constantly changing ICS environment. Thus, this paper provides an overview of the behavioral ADSs detection flaws issued from the ICS unpredictable management and its heterogeneous environment. Behavioral models will be introduced in light of four attributes: their design method, the modeled ICS behavior, the lifecycle of the design and the model nature. Then, each of these attributes will be discussed in regard of their detection robustness to the different environmental factors and uncertainties they are affected by. Copyright (C) 2021 The Authors.
引用
收藏
页码:146 / 151
页数:6
相关论文
共 15 条
[1]  
Abu Samah A., 2015, IJPHM, V6, P18
[2]   Control Behavior Integrity for Distributed Cyber-Physical Systems [J].
Adepu, Sridhar ;
Brasser, Ferdinand ;
Garcia, Luis ;
Rodler, Michael ;
Davi, Lucas ;
Sadeghi, Ahmad-Reza ;
Zonouz, Saman .
2020 ACM/IEEE 11TH INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2020), 2020, :30-40
[3]  
[Anonymous], 2015, P 1 ACM WORKSH CYB P, DOI 10.1145/2732198.2732200
[4]   Fault diagnosis for the complex manufacturing system [J].
Dang Trinh Nguyen ;
Quoc Bao Duong ;
Zamai, Eric ;
Shahzad, Muhammad Kashif .
PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART O-JOURNAL OF RISK AND RELIABILITY, 2016, 230 (02) :178-194
[5]  
Escudero C, 2018, IEEE INT C EMERG, P605, DOI 10.1109/ETFA.2018.8502585
[6]   Introduction to Industrial Control Networks [J].
Galloway, Brendan ;
Hancke, Gerhard P. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02) :860-880
[7]   SysDetect: A systematic approach to critical state determination for Industrial Intrusion Detection Systems using Apriori algorithm [J].
Khalili, Abdullah ;
Sami, Ashkan .
JOURNAL OF PROCESS CONTROL, 2015, 32 :154-160
[8]   TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems [J].
Lin, Qin ;
Adepu, Sridhar ;
Verwer, Sicco ;
Mathur, Aditya .
PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, :525-536
[9]   A Survey of Intrusion Detection Techniques for Cyber-Physical Systems [J].
Mitchell, Robert ;
Chen, Ing-Ray .
ACM COMPUTING SURVEYS, 2014, 46 (04)
[10]   Challenges for the cyber-physical manufacturing enterprises of the future [J].
Panetto, Herve ;
Lung, Benoit ;
Ivanov, Dmitry ;
Weichhart, Georg ;
Wang, Xiaofan .
ANNUAL REVIEWS IN CONTROL, 2019, 47 :200-213