Encrypted DNP3 Traffic Classification Using Supervised Machine Learning Algorithms

被引:16
作者
de Toledo, Thais [1 ]
Torrisi, Nunzio [1 ]
机构
[1] Fed Univ ABC, Ctr Math Comp & Cognit, Campus Sao Bernardo do Campo, BR-09606070 Sao Paulo, Brazil
关键词
smart grids; machine learning; DNP3; cyber security;
D O I
10.3390/make1010022
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Distributed Network Protocol (DNP3) is predominately used by the electric utility industry and, consequently, in smart grids. The Peekaboo attack was created to compromise DNP3 traffic, in which a man-in-the-middle on a communication link can capture and drop selected encrypted DNP3 messages by using support vector machine learning algorithms. The communication networks of smart grids are a important part of their infrastructure, so it is of critical importance to keep this communication secure and reliable. The main contribution of this paper is to compare the use of machine learning techniques to classify messages of the same protocol exchanged in encrypted tunnels. The study considers four simulated cases of encrypted DNP3 traffic scenarios and four different supervised machine learning algorithms: Decision tree, nearest-neighbor, support vector machine, and naive Bayes. The results obtained show that it is possible to extend a Peekaboo attack over multiple substations, using a decision tree learning algorithm, and to gather significant information from a system that communicates using encrypted DNP3 traffic.
引用
收藏
页码:384 / 399
页数:16
相关论文
共 15 条
[1]  
[Anonymous], 2009, ACM SIGKDD explorations newsletter, DOI 10.1145/1656274.1656278
[2]  
[Anonymous], 2005, DATA MINING PRACTICA
[3]  
Cardwell L., 2013, J CYBER SECUR INF SY, V1, P2
[4]  
Clarke G., 2004, PRACTICAL MODERN SCA, P537
[5]   TEN STEPS TO A SMARTER GRID [J].
Collier, Steven E. .
IEEE INDUSTRY APPLICATIONS MAGAZINE, 2010, 16 (02) :62-68
[6]  
Institute of Electrical and Electronics Engineers, 2012, IEEE STAND EL POW SY
[7]  
Jing Cai, 2010, 2010 12th IEEE International Conference on Communication Technology (ICCT 2010), P116, DOI 10.1109/ICCT.2010.5689203
[8]   Evaluation of Security Solutions in the SCADA Environment [J].
Larkin, Robert D. ;
Lopez, Juan, Jr. ;
Butts, Jonathan W. ;
Grimaila, Michael R. .
DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS, 2014, 45 (01) :38-53
[9]  
Maiolini G, 2009, LECT NOTES COMPUT SC, V5550, P182, DOI 10.1007/978-3-642-01399-7_15
[10]   A cryptographic tour of the IPsec standards [J].
Paterson, Kenneth G. .
Information Security Technical Report, 2006, 11 (02) :72-81