KingFisher: an Industrial Security Framework based on Variational Autoencoders

Giuseppe Bernieri, M. Conti, F. Turrin
{"title":"KingFisher: an Industrial Security Framework based on Variational Autoencoders","authors":"Giuseppe Bernieri, M. Conti, F. Turrin","doi":"10.1145/3362743.3362961","DOIUrl":null,"url":null,"abstract":"The recent evolution of edge computing favored the Industrial Internet of Things (IIoT) growth, opening dangerous surfaces of vulnerabilities. In this distributed sensor system scenario, due to the insecure interactions between Information Technology (IT) and Operational Technology (OT) networks, cyber-physical threats could lead to destructive consequences for environments and population safety. To deal with industrial cyber-physical security, modern anomaly detection systems implement innovative Machine Learning (ML) techniques. Unfortunately, current solutions still fail to provide an effective prevention to complex industrial threats. In this paper, we present KingFisher, an Intrusion Detection System (IDS) framework based on ML. KingFisher is, to the best of our knowledge, the first solution that looks independently at IT and OT traffic, but also from sensors deployed to capture side-channel physical processes data (e.g., vibrations, background noise). Thanks to this feature, KingFisher can detect attacks that other systems would ignore. As our tests report, the correlation of inferred physical processes status with OT-network and IT-network data can give insights into suspicious and anomalous activities targeting industrial networks. For our framework, we use the Variational Autoencoders (VAEs), an unsupervised neural network model, to categorize data without a priori knowledge of the dataset. We evaluate the detection capabilities and performances of KingFisher in a proof of concept simulated industrial scenario under cyber-physical attacks. Our preliminary results show that KingFisher identifies attacks on both network and physical layers.","PeriodicalId":425595,"journal":{"name":"Proceedings of the 1st Workshop on Machine Learning on Edge in Sensor Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 1st Workshop on Machine Learning on Edge in Sensor Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3362743.3362961","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

The recent evolution of edge computing favored the Industrial Internet of Things (IIoT) growth, opening dangerous surfaces of vulnerabilities. In this distributed sensor system scenario, due to the insecure interactions between Information Technology (IT) and Operational Technology (OT) networks, cyber-physical threats could lead to destructive consequences for environments and population safety. To deal with industrial cyber-physical security, modern anomaly detection systems implement innovative Machine Learning (ML) techniques. Unfortunately, current solutions still fail to provide an effective prevention to complex industrial threats. In this paper, we present KingFisher, an Intrusion Detection System (IDS) framework based on ML. KingFisher is, to the best of our knowledge, the first solution that looks independently at IT and OT traffic, but also from sensors deployed to capture side-channel physical processes data (e.g., vibrations, background noise). Thanks to this feature, KingFisher can detect attacks that other systems would ignore. As our tests report, the correlation of inferred physical processes status with OT-network and IT-network data can give insights into suspicious and anomalous activities targeting industrial networks. For our framework, we use the Variational Autoencoders (VAEs), an unsupervised neural network model, to categorize data without a priori knowledge of the dataset. We evaluate the detection capabilities and performances of KingFisher in a proof of concept simulated industrial scenario under cyber-physical attacks. Our preliminary results show that KingFisher identifies attacks on both network and physical layers.
KingFisher:一个基于变分自编码器的工业安全框架
边缘计算的最新发展有利于工业物联网(IIoT)的增长,从而打开了漏洞的危险表面。在这种分布式传感器系统场景中,由于信息技术(IT)和操作技术(OT)网络之间的不安全交互,网络物理威胁可能导致对环境和人口安全的破坏性后果。为了应对工业网络物理安全,现代异常检测系统采用了创新的机器学习(ML)技术。不幸的是,目前的解决方案仍然不能有效地预防复杂的工业威胁。在本文中,我们介绍了基于ML的入侵检测系统(IDS)框架KingFisher。据我们所知,KingFisher是第一个独立观察IT和OT流量的解决方案,而且还可以通过部署的传感器捕获侧信道物理过程数据(例如振动、背景噪声)。由于这个功能,翠鸟可以检测到其他系统可能忽略的攻击。正如我们的测试报告所示,推断的物理过程状态与ot网络和it网络数据的相关性可以深入了解针对工业网络的可疑和异常活动。对于我们的框架,我们使用变分自编码器(VAEs),一种无监督神经网络模型,在没有数据集先验知识的情况下对数据进行分类。我们在网络物理攻击的概念验证模拟工业场景中评估了KingFisher的检测能力和性能。我们的初步结果表明,KingFisher可以识别网络层和物理层的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信