Automated detection-in-depth in industrial control systems

被引:0
作者
Zahra Jadidi
Ernest Foo
Mukhtar Hussain
Colin Fidge
机构
[1] Queensland University of Technology (QUT),Cyber Security Cooperative Research Centre
[2] Griffith University,undefined
来源
The International Journal of Advanced Manufacturing Technology | 2022年 / 118卷
关键词
Industrial control systems; Anomaly detection; NetFlow-based analysis; Log analysis; Histogram clustering; Prediction;
D O I
暂无
中图分类号
学科分类号
摘要
Legacy industrial control systems (ICSs) are not designed to be exposed to the Internet and linking them to corporate networks has introduced a large number of cyber security vulnerabilities. Due to the distributed nature of ICS devices, a detection-in-depth strategy is required to simultaneously monitor the behaviour of multiple sources of ICS data. While a detection-in-depth method leads to detecting attacks, like flooding attacks in earlier phases before the attacker can reach the end target, most research papers have focused on anomaly detection based on a single source of ICS data. Here, we present a detection-in-depth method for an ICS network. The new method is called automated flooding attack detection (AFAD) which consists of three stages: data acquisition, pre-processing, and a flooding anomaly detector. Data acquisition includes data collection from different sources like programmable logic controller (PLC) logs and network traffic. We then generate NetFlow data to provide light-weight anomaly detection in ICS networks. NetFlow-based analysis has been used as a scalable method for anomaly detection in high-speed networks. It only analyses packet headers, and it is an efficient method for detecting flooding attacks like denial of service attacks, and its performance is not affected by encrypted data. However, it has not been sufficiently studied in industrial control systems. Besides NetFlow data, ICS device logs are a rich source of information that can be used to detect abnormal behaviour. Both NetFlow traffic and log data are processed in our pre-processing stage. The third stage of AFAD is anomaly detection which consists of two parallel machine learning analysis methods, which respectively analyse the behaviours of device logs and NetFlow records. Due to the lack of enough labelled training datasets in most environments, an unsupervised predictor and an unsupervised clustering method are respectively used in the anomaly detection stage. We validated our approach using traffic captured in a factory automation dataset, Modbus dataset, and SWAT dataset. These datasets contain physical and network level normal and abnormal data. The performance of AFAD was compared with single-layer anomaly detection and with other studies. Results showed the high precision of AFAD in detecting flooding attacks.
引用
收藏
页码:2467 / 2479
页数:12
相关论文
共 81 条
  • [1] Jadidi Z(2016)Intelligent sampling using an optimized neural network Journal of Networks 11 16-758
  • [2] Muthukkumarasamy V(2017)Flow-based web application brute-force attack and compromise detection Journal of network and systems management 25 735-89
  • [3] Sithirasenan E(2018)Flow-based compromise detection: lessons learned IEEE security & privacy 16 82-38
  • [4] Singh K(2014)A moving-average filter based hybrid ARIMA–ANN model for forecasting time series data Applied Soft Computing 23 27-125
  • [5] Hofstede R(2018)Anomaly detection for industrial control systems using process mining Computers & Security 78 103-4369
  • [6] Jonker M(2019)Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data IEEE Transactions on Industrial Informatics 15 4362-10 047
  • [7] Sperotto A(2016)Phy-layer spoofing detection with reinforcement learning in wireless networks IEEE Transactions on Vehicular Technology 65 10 037-2129
  • [8] Pras A(2018)Voltageids: low-level communication characteristics for automotive intrusion detection system IEEE Transactions on Information Forensics and Security 13 2114-2180
  • [9] Hofstede R(2018)A method for anomalies detection in real-time ethernet data traffic applied to profinet IEEE Transactions on Industrial Informatics 14 2171-4267
  • [10] Pras A(2018)Anomaly detection based on zone partition for security protection of industrial cyber-physical systems IEEE Trans Ind Electron 65 4257-121