An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems

被引:70
作者
Almalawi, Abdulmohsen [1 ]
Fahad, Adil [2 ]
Tari, Zahir [3 ]
Alamri, Abdullah [4 ]
AlGhamdi, Rayed [1 ]
Zomaya, Albert Y. [5 ]
机构
[1] King Abdulaziz Univ, Sch Comp Sci & Informat Technol, Jeddah 21589, Saudi Arabia
[2] Al Baha Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, Al Bahah 65431, Saudi Arabia
[3] RMIT Univ, Sch Comp Sci & Informat Technol, Melbourne, Vic 3046, Australia
[4] Univ Jeddah, Fac Comp & Informat Technol, Jeddah 21589, Saudi Arabia
[5] Univ Sydney, Ctr Distributed & High Performance Comp, Sch Informat Technol, Sydney, NSW 2006, Australia
关键词
Classification; Clustering; IDS; SCADA Security; MECHANISM;
D O I
10.1109/TIFS.2015.2512522
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Supervisory control and data acquisition (SCADA) systems have become a salient part in controlling critical infrastructures, such as power plants, energy grids, and water distribution systems. In the past decades, these systems were isolated and use proprietary software, operating systems, and protocols. In recent years, SCADA systems have been interfaced with enterprise systems, which therefore exposed them to the vulnerabilities of the Internet and the security threats. Traditional security solutions (e.g., firewalls, antivirus software, and intrusion detection systems) cannot fully protect SCADA systems, because they have different requirements. This paper presents an innovative intrusion detection approach to detect SCADA tailored attacks. This is based on a data-driven clustering technique of process parameters, which automatically identifies the normal and critical states of a given system. Later, it extracts proximity-based detection rules from the identified states for monitoring purposes. The effectiveness of the proposed approach is tested by conducting experiments on eight data sets that consist of process parameters' values. The empirical results demonstrated an average accuracy of 98% in automatically identifying the critical states, while facilitating the monitoring of the SCADA system.
引用
收藏
页码:893 / 906
页数:14
相关论文
共 35 条
[11]   LOF: Identifying density-based local outliers [J].
Breunig, MM ;
Kriegel, HP ;
Ng, RT ;
Sander, J .
SIGMOD RECORD, 2000, 29 (02) :93-104
[12]   A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems [J].
Carcano, A. ;
Coletta, A. ;
Guglielmi, M. ;
Masera, M. ;
Fovino, I. Nai ;
Trombetta, A. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2011, 7 (02) :179-186
[13]  
Cheung S., 2007, Proceedings of the SCADA Security Scientific Symposium, P127
[14]  
Ester M., 1996, KDD-96 Proceedings. Second International Conference on Knowledge Discovery and Data Mining, P226
[15]   Critical State-Based Filtering System for Securing SCADA Network Protocols [J].
Fovino, Igor Nai ;
Coletta, Alessio ;
Carcano, Andrea ;
Masera, Marcelo .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (10) :3943-3950
[16]   An experimental investigation of malware attacks on SCADA systems [J].
Fovino, Igor Nai ;
Carcano, Andrea ;
Masera, Marcelo ;
Trombetta, Alberto .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2009, 2 (04) :139-145
[17]   Modbus/DNP3 State-based Intrusion Detection System [J].
Fovino, Igor Nai ;
Carcano, Andrea ;
Murel, Thibault De lacheze ;
Trombetta, Alberto ;
Masera, Marcelo .
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, :729-736
[18]  
Frank A., 2010, UCI MACHINE LEARNING
[19]  
Gao W., 2010, 2010 ECRIME RES SUMM, P1, DOI DOI 10.1109/ECRIME.2010.5706699
[20]  
Linda Ondrej, 2009, Proceedings 2009 International Joint Conference on Neural Networks (IJCNN 2009 - Atlanta), P1827, DOI 10.1109/IJCNN.2009.5178592