Cross-domain alert correlation methodology for industrial control systems

被引:0
|
作者
Koucham, Oualid [1 ]
Mocanu, Stéphane [2 ]
Hiet, Guillaume [3 ]
Thiriet, Jean-Marc [1 ]
Majorczyk, Frédéric [4 ]
机构
[1] GIPSA-Lab, Univ. Grenoble Alpes, France
[2] LIG, Univ. Grenoble Alpes, CNRS, Inria, Grenoble-INP, France
[3] CentraleSupélec, Inria, CNRS, IRISA, France
[4] DGA, Inria, France
来源
Computers and Security | 2022年 / 118卷
关键词
Alert correlation - Alert enrichment - Correlation methodology - Cross-domain - Industrial control systems - Intrusion Detection Systems - Intrusion-Detection - Physical domain - Physical process - Run-time verification;
D O I
暂无
中图分类号
学科分类号
摘要
Alert correlation is a set of techniques that process alerts raised by intrusion detection systems to eliminate redundant alerts, reduce the number of false positives, and reconstruct attack scenarios. Since Industrial Control Systems (ICSs) exhibit both a physical and a cyber domain, they present unique challenges for alert correlation. The presence of heterogeneous domains each with its specific threats has led to the development of multi-domain detection techniques. Indeed, some detection approaches rely solely on observations at the level of the cyber domain, while other approaches will monitor the physical process. Although these two approaches are complementary, the nature of the information carried by the detection alerts differs. In this article, we develop an alert correlation framework tailored explicitly for ICSs. We combine physical domain intrusion detection alerts with more classical cyber domain intrusion detection alerts. We develop a correlation approach that maps physical domain alerts into the cyber domain using alert enrichment. We also propose a specific alert selection for correlation that adapts to the state of the physical process by dynamically adjusting the size of the selected alert window. We test our approach on a realistic experimental setup with and we publicly release all datasets used to derive our results. Our cross-domain correlation methodology achieves better correlation metrics compared to classical temporal-based correlation approaches in terms of false correlation rate, missing correlation rate and alert reduction. © 2022 Elsevier Ltd
引用
收藏
相关论文
共 50 条
  • [1] Cross-domain Recommendation with Semantic Correlation in Tagging Systems
    Zhang, Qian
    Hao, Peng
    Lu, Jie
    Zhang, Guangquan
    2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
  • [2] Cross-domain Anomaly Detection for Power Industrial Control System
    Li, Yanjie
    Ji, Xiaoyu
    Li, Chenggang
    Xu, Xiaofeng
    Yan, Wei
    Yan, Xu
    Chen, Yanjiao
    Xu, Wenyuan
    PROCEEDINGS OF 2020 IEEE 10TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2020), 2020, : 383 - 386
  • [3] Cross-Domain Access Control Model in Industrial IoT Environment
    Zhang, Zhen
    Wu, Xu
    Wei, Shuang
    APPLIED SCIENCES-BASEL, 2023, 13 (08):
  • [4] A cross-domain trust inferential transfer model for cross-domain Industrial Internet of Things
    Wu, Xu
    Liang, Junbin
    ICT EXPRESS, 2023, 9 (05): : 761 - 768
  • [5] Cross-Domain Network Slicing for Industrial Applications
    Theodorou, Vasileios
    Katsaros, Konstantinos V.
    Roos, Andreas
    Sakic, Ermin
    Kulkarni, Vivek
    2018 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2018, : 209 - 213
  • [6] Tutorial on Cross-domain Recommender Systems
    Cantador, Ivan
    Cremonesi, Paolo
    PROCEEDINGS OF THE 8TH ACM CONFERENCE ON RECOMMENDER SYSTEMS (RECSYS'14), 2014, : 401 - 402
  • [7] A Tool-Based Hybrid Methodology for Achieving Impactful Cross-Domain Systems Engineering
    Campbell, Dave
    Drewniak, Eric
    LaFortune, Ryan
    Wampole, Garrett
    ADVANCES IN HUMAN FACTORS, SOFTWARE, AND SYSTEMS ENGINEERING, 2016, 492 : 3 - 12
  • [8] The ARTEMIS cross-domain architecture for embedded systems
    Kopetz, Hermann
    2007 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, VOLS 1-3, 2007, : 1468 - 1469
  • [9] Intrusion Detection Systems: A Cross-Domain Overview
    Tidjon, Lionel N.
    Frappier, Marc
    Mammar, Amel
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04): : 3639 - 3681
  • [10] Cross-domain access control via PKI
    Denker, G
    Millen, J
    Miyake, Y
    THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 202 - 205