Correlation-Based Anomaly Detection in Industrial Control Systems

被引:5
|
作者
Jadidi, Zahra [1 ,2 ]
Pal, Shantanu [3 ]
Hussain, Mukhtar [1 ]
Thanh, Kien Nguyen [4 ]
机构
[1] Queensland Univ Technol, Sch Comp Sci, Brisbane, Qld 4000, Australia
[2] Griffith Univ, Sch Informat & Commun Technol, Gold Coast, Qld 4222, Australia
[3] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
[4] Queensland Univ Technol, Sch Elect Engn & Robot, Brisbane, Qld 4000, Australia
关键词
industrial control systems; cyber attacks; anomaly detection; recurrent neural networks; correlation analysis;
D O I
10.3390/s23031561
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Industrial Control Systems (ICSs) were initially designed to be operated in an isolated network. However, recently, ICSs have been increasingly connected to the Internet to expand their capability, such as remote management. This interconnectivity of ICSs exposes them to cyber-attacks. At the same time, cyber-attacks in ICS networks are different compared to traditional Information Technology (IT) networks. Cyber attacks on ICSs usually involve a sequence of actions and a multitude of devices. However, current anomaly detection systems only focus on local analysis, which misses the correlation between devices and the progress of attacks over time. As a consequence, they lack an effective way to detect attacks at an entire network scale and predict possible future actions of an attack, which is of significant interest to security analysts to identify the weaknesses of their network and prevent similar attacks in the future. To address these two key issues, this paper presents a system-wide anomaly detection solution using recurrent neural networks combined with correlation analysis techniques. The proposed solution has a two-layer analysis. The first layer targets attack detection, and the second layer analyses the detected attack to predict the next possible attack actions. The main contribution of this paper is the proof of the concept implementation using two real-world ICS datasets, SWaT and Power System Attack. Moreover, we show that the proposed solution effectively detects anomalies and attacks on the scale of the entire ICS network.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] An error neighborhood-based detection mechanism to improve the performance of anomaly detection in industrial control systems
    Shen, Wendi
    Yang, Genke
    2022 INTERNATIONAL CONFERENCE ON MECHANICAL, AUTOMATION AND ELECTRICAL ENGINEERING, CMAEE, 2022, : 25 - 29
  • [42] Scale correlation-based edge detection
    Bao, P
    Lei, Z
    PROCEEDINGS VIPROMCOM-2002, 2002, : 345 - 350
  • [43] Correlation-based detection of attribute outliers
    Koh, Judice L. Y.
    Lee, Mong Li
    Hsu, Wynne
    Lam, Kai Tak
    ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 164 - +
  • [44] On Efficiency Enhancement of the Correlation-based Feature Selection for Intrusion Detection Systems
    Shahbaz, Mahsa Bataghva
    Wang, Xianbin
    Behnad, Aydin
    Samarabandu, Jagath
    7TH IEEE ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE IEEE IEMCON-2016, 2016,
  • [45] An analysis of correlation-based watermarking systems
    Ejima, M
    Miyazaki, A
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 2003, 86 (11): : 1 - 12
  • [46] Adaptive model based on ESN for anomaly detection in industrial systems
    Rodríguez-Ossorio, José Ramón
    Morán, Antonio
    Fuertes, Juan J.
    Prada, Miguel A.
    Díaz, Ignacio
    Domínguez, Manuel
    Evolving Systems, 2025, 16 (01)
  • [47] Deep Learning-based Multi-PLC Anomaly Detection in Industrial Control Systems
    Gawehn, Philip
    Ergenc, Doganalp
    Fischer, Mathias
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4878 - 4884
  • [48] Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems
    Fung, Clement
    Srinarasi, Shreya
    Lucas, Keane
    Phee, Hay Bryan
    Bauer, Lujo
    COMPUTER SECURITY - ESORICS 2022, PT III, 2022, 13556 : 493 - 513
  • [49] Research on Industrial Control Anomaly Detection Based on FCM and SVM
    Shang, Wenli
    Cui, Junrong
    Song, Chunhe
    Zhao, Jianming
    Zeng, Peng
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 218 - 222
  • [50] A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems
    Feng, Cheng
    Palleti, Venkata Reddy
    Mathur, Aditya
    Chana, Deeph
    26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,