工业控制系统异常通信模式的挖掘

Tsung-Chiao Yu, Jyun-Yao Huang, I-En Liao, Kuo-Fong Kao
{"title":"工业控制系统异常通信模式的挖掘","authors":"Tsung-Chiao Yu, Jyun-Yao Huang, I-En Liao, Kuo-Fong Kao","doi":"10.1109/AUPEC.2018.8757940","DOIUrl":null,"url":null,"abstract":"The attacks on industrial control systems (ICS) have been exemplified by the malwares Stuxnet, Industroyer, and Triton that targeted nuclear facilities of Iran in 2010, power grid of Ukraine in 2016, and Safety Instrumented System (SIS) controllers of a Middle East country in 2017, respectively. As a result, the issues concerning Critical Infrastructure Information Protection (CIIP) have drawn much attention among academia, industry, and government in many countries.In this paper, we propose an anomaly detection method for ICS networks. The main idea of the proposed method is to model the normal behavior patterns of TCP and UDP payloads as frequent patterns and non-frequent pattern clusters. The normal behavior payloads are first processed by sequential pattern mining algorithm to extract frequent patterns, and then the payloads are projected against frequent patterns. After projection, the projected payloads are clustered using hierarchical agglomerative clustering algorithm to find representative variations in normal behaviors. The experimental results show that the proposed method has very good performance in terms of the metrics such as accuracy, recall, precision, false alarm, and false dismissal for the ICS networks that use Modbus/TCP or BACnet protocols. The proposed system model can also leverage honeypots deployed in ICS networks to generate attack signatures, which can be helpful in filtering out known attacks.","PeriodicalId":314530,"journal":{"name":"2018 Australasian Universities Power Engineering Conference (AUPEC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Mining Anomaly Communication Patterns for Industrial Control Systems\",\"authors\":\"Tsung-Chiao Yu, Jyun-Yao Huang, I-En Liao, Kuo-Fong Kao\",\"doi\":\"10.1109/AUPEC.2018.8757940\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The attacks on industrial control systems (ICS) have been exemplified by the malwares Stuxnet, Industroyer, and Triton that targeted nuclear facilities of Iran in 2010, power grid of Ukraine in 2016, and Safety Instrumented System (SIS) controllers of a Middle East country in 2017, respectively. As a result, the issues concerning Critical Infrastructure Information Protection (CIIP) have drawn much attention among academia, industry, and government in many countries.In this paper, we propose an anomaly detection method for ICS networks. The main idea of the proposed method is to model the normal behavior patterns of TCP and UDP payloads as frequent patterns and non-frequent pattern clusters. The normal behavior payloads are first processed by sequential pattern mining algorithm to extract frequent patterns, and then the payloads are projected against frequent patterns. After projection, the projected payloads are clustered using hierarchical agglomerative clustering algorithm to find representative variations in normal behaviors. The experimental results show that the proposed method has very good performance in terms of the metrics such as accuracy, recall, precision, false alarm, and false dismissal for the ICS networks that use Modbus/TCP or BACnet protocols. The proposed system model can also leverage honeypots deployed in ICS networks to generate attack signatures, which can be helpful in filtering out known attacks.\",\"PeriodicalId\":314530,\"journal\":{\"name\":\"2018 Australasian Universities Power Engineering Conference (AUPEC)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Australasian Universities Power Engineering Conference (AUPEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AUPEC.2018.8757940\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Australasian Universities Power Engineering Conference (AUPEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AUPEC.2018.8757940","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

针对工业控制系统(ICS)的攻击,2010年以伊朗核设施为目标的恶意软件Stuxnet、2016年以乌克兰电网为目标的恶意软件industriyer、2017年以中东国家安全仪表系统(SIS)控制器为目标的恶意软件Triton就是典型的例子。因此,关键基础设施信息保护(CIIP)问题已引起各国学术界、工业界和政府的高度重视。本文提出了一种针对ICS网络的异常检测方法。该方法的主要思想是将TCP和UDP有效负载的正常行为模式建模为频繁模式和非频繁模式集群。首先通过顺序模式挖掘算法对正常行为载荷进行处理,提取频繁模式,然后根据频繁模式对载荷进行投影。投影完成后,利用分层聚类算法对投影后的有效载荷进行聚类,寻找具有代表性的正常行为变化。实验结果表明,对于使用Modbus/TCP或BACnet协议的ICS网络,所提出的方法在准确率、查全率、精密度、虚警和误解雇等指标上都有很好的性能。所提出的系统模型还可以利用部署在ICS网络中的蜜罐来生成攻击签名,这有助于过滤已知的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Mining Anomaly Communication Patterns for Industrial Control Systems
The attacks on industrial control systems (ICS) have been exemplified by the malwares Stuxnet, Industroyer, and Triton that targeted nuclear facilities of Iran in 2010, power grid of Ukraine in 2016, and Safety Instrumented System (SIS) controllers of a Middle East country in 2017, respectively. As a result, the issues concerning Critical Infrastructure Information Protection (CIIP) have drawn much attention among academia, industry, and government in many countries.In this paper, we propose an anomaly detection method for ICS networks. The main idea of the proposed method is to model the normal behavior patterns of TCP and UDP payloads as frequent patterns and non-frequent pattern clusters. The normal behavior payloads are first processed by sequential pattern mining algorithm to extract frequent patterns, and then the payloads are projected against frequent patterns. After projection, the projected payloads are clustered using hierarchical agglomerative clustering algorithm to find representative variations in normal behaviors. The experimental results show that the proposed method has very good performance in terms of the metrics such as accuracy, recall, precision, false alarm, and false dismissal for the ICS networks that use Modbus/TCP or BACnet protocols. The proposed system model can also leverage honeypots deployed in ICS networks to generate attack signatures, which can be helpful in filtering out known attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信