Two-Phase Industrial Control System Anomaly Detection Using Communication Patterns and Deep Learning

Author:

Kim Sungjin1ORCID,Jo Wooyeon2ORCID,Kim Hyunjin3,Choi Seokmin4,Jung Da-I4,Choi Hyeonho4,Shon Taeshik35

Affiliation:

1. OT Security Group, Samsung SDS, Seoul 03922, Republic of Korea

2. SAFE Lab, Virginia Commonwealth University, ERB 3339 401 W Main St, Richmond, VA 23284, USA

3. Department of Computer Engineering, Ajou University, Suwon 16499, Republic of Korea

4. Information Security Team, Korea Power Exchange, Naju 58322, Republic of Korea

5. Department of Cybersecurity, Ajou University, Suwon 16499, Republic of Korea

Abstract

Several cases of Industrial Internet of Things (IIoT) attacks with zero-day vulnerabilities have been reported. To prevent these attacks, it is necessary to apply an abnormal behavior detection method; however, there are three main problems that make it hard. First, there are various industrial communication protocols. Instead of IT environments, many unstandardized protocols, which are usually defined by vendors, are used. Second, legacy devices are commonly used, not only EOS (End-of-service), but also EoL (End-of-Life). And last, the analysis of collected data is necessary for defining normal behavior. This behavior should be separately defined in each IIoT. Therefore, it is difficult to apply abnormal behavior detection in environments where economic and human investment is difficult. To solve these problems, we propose a deep learning based abnormal behavior detection technique that utilizes IIoT communication patterns. The proposed method uses a deep learning technique to train periodic data acquisition sequences, which is one of the common characteristics of IIoT. The trained model determined the sequence of packet is normal. The proposed technique can be applied without an additional analysis. The proposed method is expected to prevent security threats by proactively detecting cyberattacks. To verify the proposed method, a dataset was collected from the Korea Electric Power Control System. The model that defines normal behavior based on the application layer exhibits an accuracy of 79.6%. The other model, defining normal behavior based on the transport layer, has an accuracy of 80.9%. In these two models, most false positives and false negatives only occur when the abnormal packet is in a sequence.

Funder

National Research Foundation of Korea

Publisher

MDPI AG

Reference26 articles.

1. Kaspersky (2020, December 08). ICS Threat Predictions for 2021. Available online: https://ics-cert.kaspersky.com/media/Kaspersky-ICS-CERT-Threat-Predictions-2021-EN.pdf.

2. Targeted ransomware: A new cyber threat to edge system of brownfield industrial Internet of Things;Hartog;IEEE Internet Things J.,2019

3. APAD: Autoencoder-based Payload Anomaly Detection for industrial IoE;Kim;Appl. Soft Comput.,2020

4. Securing IoT Space via Hardware Trojan Detection;Guo;IEEE Internet Things J.,2020

5. Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems;Chaudhry;Comput. Commun.,2020

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3