Methodology to Determine the Device-Level Periodicity for Anomaly Detection in EtherCAT-Based Industrial Control Network

被引:22
作者
Akpinar, Kevser Ovaz [1 ]
Ozcelik, Ibrahim [1 ]
机构
[1] Sakarya Univ, Dept Comp Engn, TR-54040 Sakarya, Turkey
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2021年 / 18卷 / 02期
关键词
Integrated circuits; Protocols; Anomaly detection; Monitoring; TCPIP; Traffic control; Critical infrastructure; EtherCAT; critical infrastructure systems; industrial control systems; periodicity detection; SCADA security; zero-day attacks; INTRUSION DETECTION SYSTEM; DEMAND FORECAST;
D O I
10.1109/TNSM.2020.3037050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Continuous operation and monitoring of critical infrastructure networks are crucial to ensure their sustainability and security. To achieve these, industrial control system (ICS) networks and supervisory control and data acquisition (SCADA) systems are deployed in critical infrastructure assets. Many events in ICS networks present strong periodical patterns because of process repetition or cyclic communication. From the security viewpoint, inferring the periodicity primarily in the device-level communications where the actuator/sensor, field, and the cell-level transmissions are performed is important for detecting anomalies. The synchronization period and traffic pattern need to be known for anomaly detection. This article presents a novel periodicity detection approach specifically for Ethernet for control automation technology (EtherCAT) networks. It uses protocol-specific operations and fields for detecting device-level periodicity. Using the period, an anomaly detection method that uncovers traffic pattern statistics is also proposed. The periodicity can be detected with different precision, significance levels, and lag sizes. Four programmable logic controller (PLC) programs were developed to demonstrate the feasibility of the periodicity detection approach, and the periodicity was automatically obtained with high accuracy. As any malicious activity on the system causes variances in the periodic pattern, the approach was also tested on synthetic traffic traces that contain denial of service (DoS) and code-injection attacks. The traffic patterns were uncovered by an anomaly detection module, which was developed on a Snort intrusion detection/prevention system (IDS/IPS) and used the captured period. The tests demonstrated that intrusions that exploit communication patterns are fully flagged.
引用
收藏
页码:2308 / 2319
页数:12
相关论文
共 45 条
[1]   Analysis of Machine Learning Methods in EtherCAT-Based Anomaly Detection [J].
Akpinar, Kevser Ovaz ;
Ozcelik, Ibrahim .
IEEE ACCESS, 2019, 7 :184365-184374
[2]   Development of the ECAT Preprocessor with the Trust Communication Approach [J].
Akpinar, Kevser Ovaz ;
Ozcelik, Ibrahim .
SECURITY AND COMMUNICATION NETWORKS, 2018,
[3]   Daily basis mid-term demand forecast of city natural gas using univariate statistical techniques [J].
Akpinar, Mustafa ;
Yumusak, Nejat .
JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2020, 35 (02) :725-741
[4]   Year Ahead Demand Forecast of City Natural Gas Using Seasonal Time Series Methods [J].
Akpinar, Mustafa ;
Yumusak, Nejat .
ENERGIES, 2016, 9 (09)
[5]  
Al-Dalky R, 2014, 2014 9TH INTERNATIONAL SYMPOSIUM ON COMMUNICATION SYSTEMS, NETWORKS & DIGITAL SIGNAL PROCESSING (CSNDSP), P809, DOI 10.1109/CSNDSP.2014.6923938
[6]  
[Anonymous], 2017, PROC 2 INT C COMPUTE
[7]  
[Anonymous], 2016, OVERLOAD CRITICAL LE
[8]  
[Anonymous], 2015, DELL SECURITY ANN TH
[9]  
Argon O, 2013, IEEE INFOCOM SER, P1672
[10]   Exploiting traffic periodicity in industrial control networks [J].
Barbosa, Rafael Ramos Regis ;
Sadre, Ramin ;
Pras, Aiko .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2016, 13 :52-62