{"title":"KingFisher: an Industrial Security Framework based on Variational Autoencoders","authors":"Giuseppe Bernieri, M. Conti, F. Turrin","doi":"10.1145/3362743.3362961","DOIUrl":null,"url":null,"abstract":"The recent evolution of edge computing favored the Industrial Internet of Things (IIoT) growth, opening dangerous surfaces of vulnerabilities. In this distributed sensor system scenario, due to the insecure interactions between Information Technology (IT) and Operational Technology (OT) networks, cyber-physical threats could lead to destructive consequences for environments and population safety. To deal with industrial cyber-physical security, modern anomaly detection systems implement innovative Machine Learning (ML) techniques. Unfortunately, current solutions still fail to provide an effective prevention to complex industrial threats. In this paper, we present KingFisher, an Intrusion Detection System (IDS) framework based on ML. KingFisher is, to the best of our knowledge, the first solution that looks independently at IT and OT traffic, but also from sensors deployed to capture side-channel physical processes data (e.g., vibrations, background noise). Thanks to this feature, KingFisher can detect attacks that other systems would ignore. As our tests report, the correlation of inferred physical processes status with OT-network and IT-network data can give insights into suspicious and anomalous activities targeting industrial networks. For our framework, we use the Variational Autoencoders (VAEs), an unsupervised neural network model, to categorize data without a priori knowledge of the dataset. We evaluate the detection capabilities and performances of KingFisher in a proof of concept simulated industrial scenario under cyber-physical attacks. Our preliminary results show that KingFisher identifies attacks on both network and physical layers.","PeriodicalId":425595,"journal":{"name":"Proceedings of the 1st Workshop on Machine Learning on Edge in Sensor Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 1st Workshop on Machine Learning on Edge in Sensor Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3362743.3362961","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
The recent evolution of edge computing favored the Industrial Internet of Things (IIoT) growth, opening dangerous surfaces of vulnerabilities. In this distributed sensor system scenario, due to the insecure interactions between Information Technology (IT) and Operational Technology (OT) networks, cyber-physical threats could lead to destructive consequences for environments and population safety. To deal with industrial cyber-physical security, modern anomaly detection systems implement innovative Machine Learning (ML) techniques. Unfortunately, current solutions still fail to provide an effective prevention to complex industrial threats. In this paper, we present KingFisher, an Intrusion Detection System (IDS) framework based on ML. KingFisher is, to the best of our knowledge, the first solution that looks independently at IT and OT traffic, but also from sensors deployed to capture side-channel physical processes data (e.g., vibrations, background noise). Thanks to this feature, KingFisher can detect attacks that other systems would ignore. As our tests report, the correlation of inferred physical processes status with OT-network and IT-network data can give insights into suspicious and anomalous activities targeting industrial networks. For our framework, we use the Variational Autoencoders (VAEs), an unsupervised neural network model, to categorize data without a priori knowledge of the dataset. We evaluate the detection capabilities and performances of KingFisher in a proof of concept simulated industrial scenario under cyber-physical attacks. Our preliminary results show that KingFisher identifies attacks on both network and physical layers.