Anomaly Detection in SCADA Systems A Network Based Approach

نویسندگان

  • Rafael Ramos
  • Regis Barbosa
  • A. J. Mouthaan
  • B. R. Haverkort
  • Boudewijn R. Haverkort
  • Boudewijn Haverkort
چکیده

Supervisory Control and Data Acquisition (SCADA) networks are commonly deployed to aid the operation of large industrial facilities, such as water treatment and distribution facilities, and electricity and gas providers. Historically, SCADA networks were composed by special-purpose embedded devices communicating through proprietary protocols. However, three main trends can be observed in modern deployments: (i) SCADA networks are becoming increasingly interconnected, allowing communication with corporate networks, remote access from engineers and system administrators, and even communication with the Internet; (ii) the use of commercial off-the-shelf devices, such as Windows desktops; and (iii) the adoption of the TCP/IP protocol stack. As a result, these networks become vulnerable to cyber attacks, being exposed to the same threats that plague traditional IT systems. In our view, measurements play an essential role in validating results in network research, and can sometimes lead to surprising insights. Therefore, the first objective of this thesis is to understand how SCADA networks are utilized in practice. To this end, we provide the first comprehensive analysis of real-world SCADA traffic. We analyze five network packet traces collected at four different critical infrastructures: two water treatment facilities, one gas utility, and one (mixed) electricity and gas utility. We show exiting network traffic models developed for traditional IT networks cannot be directly applied to SCADA network traffic. In particular, SCADA networks do not present daily patterns of activity and self-similarity. We also validate two commonly held assumptions regarding SCADA traffic. First, we show that the SCADA connectivity matrix is stable, that is, the list of “who is communicating with whom” typically presents few and small changes. Second, we provide evidence that a large number of SCADA hosts, in particular all Programmable Logic Controllers (PLCs) in our datasets, generate traffic periodically. Based on our analysis of real-world SCADA network traffic, the second objective of this thesis is to exploit the stable connection matrix and the traffic periodicity to perform anomaly detection. In order to exploit the stable connec-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

Moving dispersion method for statistical anomaly detection in intrusion detection systems

A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...

متن کامل

Safeguarding SCADA Systems with Anomaly Detection

This paper will show how the accuracy and security of SCADA systems can be improved by using anomaly detection to identify bad values caused by attacks and faults. The performance of invariant induction and ngram anomaly-detectors will be compared and this paper will also outline plans for taking this work further by integrating the output from several anomalydetecting techniques using Bayesian...

متن کامل

A Statechart-Based Anomaly Detection Model for Multi-Threaded SCADA Systems

SCADA traffic between the Human Machine Interface (HMI) and the Programmable Logic Controller (PLC) is known to be highly periodic. However, it is sometimes multiplexed, due to asynchronous scheduling. Modeling the network traffic patterns of multiplexed SCADA streams using Deterministic Finite Automata (DFA) for anomaly detection typically produces a very large DFA, and a high false-alarm rate...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014