Detecting intrusions in encrypted control traffic

Maarten Hoeve
{"title":"Detecting intrusions in encrypted control traffic","authors":"Maarten Hoeve","doi":"10.1145/2516930.2516945","DOIUrl":null,"url":null,"abstract":"Because of a lack of attack signatures and different forms of attacks, signature-based network intrusion detection systems currently provide insufficient protection for industrial control traffic. A combination of two anomaly detection approaches found in the literature, one based on network flows and the other on protocol specific deep-packet inspection, seems to be able to detect many expected threats. Deep-packet inspection cannot be used however, when payloads cannot be read because they are encrypted, or the protocol is unfamiliar.\n This paper proposes an intrusion detection approach that does not need to inspect the payload, and can still perform much the same function as the deep-packet approach. It consists of three steps: separate insertions caused by commands from the background of polling cycle traffic, recognize and react on known insertions, and alert on unknown insertions. The approach is implemented using searches for series of packets, based on the edit distance from approximate string matching. Tests show that this implementation can perform the steps necessary for the approach.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM workshop on Smart Energy Grid Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2516930.2516945","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Because of a lack of attack signatures and different forms of attacks, signature-based network intrusion detection systems currently provide insufficient protection for industrial control traffic. A combination of two anomaly detection approaches found in the literature, one based on network flows and the other on protocol specific deep-packet inspection, seems to be able to detect many expected threats. Deep-packet inspection cannot be used however, when payloads cannot be read because they are encrypted, or the protocol is unfamiliar. This paper proposes an intrusion detection approach that does not need to inspect the payload, and can still perform much the same function as the deep-packet approach. It consists of three steps: separate insertions caused by commands from the background of polling cycle traffic, recognize and react on known insertions, and alert on unknown insertions. The approach is implemented using searches for series of packets, based on the edit distance from approximate string matching. Tests show that this implementation can perform the steps necessary for the approach.
检测加密控制流量中的入侵
由于攻击特征的缺乏和攻击形式的不同,目前基于特征的网络入侵检测系统对工控流量的防护能力不足。在文献中发现的两种异常检测方法的组合,一种基于网络流,另一种基于协议特定的深度包检测,似乎能够检测到许多预期的威胁。但是,当有效负载由于加密或协议不熟悉而无法读取时,则不能使用深度包检测。本文提出了一种不需要检测有效载荷的入侵检测方法,并且仍然可以执行与深度包方法相同的功能。它包括三个步骤:分离轮询周期流量后台命令引起的插入,识别已知插入并对其作出反应,以及对未知插入发出警报。该方法基于与近似字符串匹配的编辑距离来搜索一系列数据包。测试表明,此实现可以执行该方法所需的步骤。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信